Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
2024 Outlook for AI Regulations
Sponsored by: ModelOpAs AI regulations rapidly evolve, enterprises must act now to govern their AI initiatives. This e-book outlines the key challenges and steps to get started, including deploying an AI governance inventory, implementing basic controls, and reporting on compliance. Read the full e-book to prepare your enterprise for the future of AI.
-
Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the organisation that runs men's tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.
-
Veracode 10 Insights for DORA Compliance
Sponsored by: VeracodeThe Digital Operational Resilience Act (DORA) is vital for EU financial firms and third-party providers. So, how can you ensure your company complies? View this infographic to gain 10 insights for attaining DORA compliance.
-
The Secure Coding Handbook
Sponsored by: VeracodeThis 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
-
The Top 10 AI Skills Your Team Needs To Put Your Cloud To Work
Sponsored by: QAIn this white paper, you'll discover the top 10 AI skills your tech team needs to leverage cloud computing. From data analysis to machine learning and ethical AI, this white paper explores the critical capabilities required to successfully implement AI models and drive business value. Read the full white paper to build your team's AI expertise.
-
Annual Report On The State Of Application Security
Sponsored by: VeracodeIn the current spectrum of cybersecurity, organizations are continuously trying to reduce their security debt, but what is just as important is to not introduce security flaws that can accumulate over the life of your applications, making them more vulnerable in the long run. Read on to learn more about the current state of application security.
-
Zero Trust for the Workforce July 2024
Sponsored by: CloudflareCloudflare commissioned Enterprise Strategy Group to survey 200 senior IT security decision-makers about their approach to securing user access to corporate apps and resources, across traditional, digital-native, and public-sector organizations. Download the eBook to see the consensus about Zero Trust for the workforce.
-
Considerations for Implementing Zero Trust for the Workforce
Sponsored by: CloudflareAs the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.
-
UK and Ireland Salary Survey 2016/2017 results
Sponsored by: TechTarget ComputerWeekly.comOver 700 UKI IT professionals reveal their salaries and career expectations for 2016/2017
-
5 Common Audit Processes You Can Automate in One Week
Sponsored by: AlteryxIn this e-book, find out how to stop paying fines, fees, and the price of human error — while also enjoying faster results and scaling up more easily — by automating t5 key processes. Get your copy and empower your own analysts to blast through repetitive processes so they can deliver on time and in compliance.