ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Top 10 datacentre stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    There is nothing like a datacentre outage to highlight just how reliant the digital economy is on these facilities, with the 2018 news cycle dominated by tales of server rooms going awry and causing mass disruption to end users across the globe. Here's a look back over Computer Weekly's top 10 datacentre stories of 2018.

  • The State of Zero Trust Security 2023

    Sponsored by: Okta

    In partnership with Qualtrics, Okta conducted a global study with the help of 860 information security decisionmakers across a range of industry verticals. In the 38 pages of this report, Okta has condensed the findings of this research so that you can extract the most valuable and relevant information. Read on to learn more.

  • Top Health IT Analytics Forecasts and Goals for the Coming Year

    Sponsored by: XtelligentMedia Healthcare

    Health IT analytics and artificial intelligence experts say that healthcare organizations should focus on AI governance, transparency, and collaboration in 2024.

  • CVE-2021-2035 and RDBMS Scheduler Security

    Sponsored by: Spinnaker Support

    This white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.

  • 10 AI and machine learning use cases in ITSM

    Sponsored by: TechTarget ComputerWeekly.com

    AI-enabled ITSM, while still maturing, promises to greatly improve the speed and quality of IT service management. Here are 10 AI and machine learning use cases for ITSM

  • Powerful, Application-aware Investigation Tools.

    Sponsored by: Endace

    When you’re investigating a security incident, you want to eliminate any guesswork. EndaceVision, a browser-based investigation GUI, can help you do so. Learn all about the product in this data sheet.

  • Webinar Series for ABM: An 8-Step Planning Framework

    Sponsored by: BrightTALK by TechTarget

    Account-based marketing (ABM) has become a popular strategy within the B2B tech space, especially as B2B marketers look to better align with the way Sales operates. Yet some argue that ABM program success has been mixed or even underwhelming at times. Access this e-book to learn more.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • Computer Weekly - 14 December 2021: The rules for a safer internet

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.

  • Sustainability at the Edge

    Sponsored by: Schneider Electric

    There is a yawning gap between enterprise perceptions and sustainability initiative realities. So how can your organization bridge the gap? Find out in this research report.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.