ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • 2024 Outlook for AI Regulations

    Sponsored by: ModelOp

    As AI regulations rapidly evolve, enterprises must act now to govern their AI initiatives. This e-book outlines the key challenges and steps to get started, including deploying an AI governance inventory, implementing basic controls, and reporting on compliance. Read the full e-book to prepare your enterprise for the future of AI.

  • Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the organisation that runs men's tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.

  • Veracode 10 Insights for DORA Compliance

    Sponsored by: Veracode

    The Digital Operational Resilience Act (DORA) is vital for EU financial firms and third-party providers. So, how can you ensure your company complies? View this infographic to gain 10 insights for attaining DORA compliance.

  • The Secure Coding Handbook

    Sponsored by: Veracode

    This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.

  • The Top 10 AI Skills Your Team Needs To Put Your Cloud To Work

    Sponsored by: QA

    In this white paper, you'll discover the top 10 AI skills your tech team needs to leverage cloud computing. From data analysis to machine learning and ethical AI, this white paper explores the critical capabilities required to successfully implement AI models and drive business value. Read the full white paper to build your team's AI expertise.

  • Annual Report On The State Of Application Security

    Sponsored by: Veracode

    In the current spectrum of cybersecurity, organizations are continuously trying to reduce their security debt, but what is just as important is to not introduce security flaws that can accumulate over the life of your applications, making them more vulnerable in the long run. Read on to learn more about the current state of application security.

  • Zero Trust for the Workforce July 2024

    Sponsored by: Cloudflare

    Cloudflare commissioned Enterprise Strategy Group to survey 200 senior IT security decision-makers about their approach to securing user access to corporate apps and resources, across traditional, digital-native, and public-sector organizations. Download the eBook to see the consensus about Zero Trust for the workforce.

  • Considerations for Implementing Zero Trust for the Workforce

    Sponsored by: Cloudflare

    As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.

  • UK and Ireland Salary Survey 2016/2017 results

    Sponsored by: TechTarget ComputerWeekly.com

    Over 700 UKI IT professionals reveal their salaries and career expectations for 2016/2017

  • 5 Common Audit Processes You Can Automate in One Week

    Sponsored by: Alteryx

    In this e-book, find out how to stop paying fines, fees, and the price of human error — while also enjoying faster results and scaling up more easily — by automating t5 key processes. Get your copy and empower your own analysts to blast through repetitive processes so they can deliver on time and in compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.