ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • The CISO Guide to Ransomware Prevention

    Sponsored by: Checkpoint Software Technologies

    Over the last 5 years, ransomware attacks have increased by 13%, with the average cost exceeding $1.8 million per incident. This white paper presents a CISO’s guide to ransomware prevention, including insights from Check Point VP Security Engineering, Jeff Schwartz. Read on to learn more.

  • Computer Weekly - 3 March 2020: What will points-based immigration mean for IT recruitment?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the government's new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now.

  • The Public Sector’s Guide to Privilege

    Sponsored by: CyberFOX

    Cybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.

  • LevelBlue Futures™ Report 2024

    Sponsored by: AT&T and LevelBlue

    This 2024 research uncovered the relationships between the barriers to cyber and cybersecurity resilience and how the business prioritizes them. Get your copy of the report to learn what’s on the horizon that may impact cyber resilience, five steps for prioritizing cyber resilience, and more.

  • Top 10 business applications stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    The steady modernisation of ERP systems, as they edge to the cloud and are complemented by new-generation customer software, was markedly evident this year. And blockchain and AI are making inroads. In this e-guide, Computer Weekly takes a look at the top 10 business applications of 2018.

  • Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

  • Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.

  • Security Threats for Apps “In the Wild”

    Sponsored by: Digital.ai

    Download this study to learn how security professionals can safeguard their apps and users from malicious activities by illuminating and quantifying the threats to applications in the wild.

  • The Benefits of Using a Data Driven Approach to Risk Management

    Sponsored by: Ostendio

    PH

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.