Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Large Language Model (LLM) Security
Sponsored by: Shakudo Inc.In this white paper, you'll learn about the top 10 security risks to LLMs, including training data poisoning and more. You'll also gain specific tips to mitigate those risks as well as best practices for securing your data, models, and infrastructure. Read on now to find out how you can enhance your security measures for LLMs.
-
Why Modern Enterprises Need SD-WAN
Sponsored by: VMware, Inc.To review 7 SD-WAN success stories that VMware helped facilitate, explore this 15-page e-book.
-
Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.
-
Top 10 enterprise IT in the Middle East stories of 2019
Sponsored by: TechTarget ComputerWeekly.comCountries in the Middle East have become pioneers of the latest digital technologies and some of the articles featured by Computer Weekly this year evidence that. Here are Computer Weekly's top 10 enterprise IT in the Middle East stories of 2019.
-
How transport and logistics organisations can build agile and cyber resilient operations
Sponsored by: VodafoneIn this eBook, you’ll learn about what issues transport and logistics organizations are facing, key trends that are impacting the sector, and how technology can help these firms be better prepared to overcome the challenges of today and the future. Read the eBook here.
-
Computer Weekly – 10 March 2020: Is technology innovation broken?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, despite its reputation for fresh thinking the tech sector is stuck in old ways that prevent true innovation – an expert explains why. Our buyer's guide examines how networking is affected by the growth of cloud-native applications. And we look at the key tech-related compliance issues for SMEs. Read the issue now.
-
Computer Weekly – 10 July 2018: Tackling the digital identity problem
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.
-
The Role of Mobile Engagement: Insights from Healthcare Leaders
Sponsored by: Gozio HealthDownload this report to find out what nearly 275 healthcare executives think about the state of mobile experience in healthcare.
-
2024 PKI and Post-Quantum Trends Study
Sponsored by: Entrust, Inc.In this report, Ponemon Institute presents the findings based on a survey of 2,176 IT and IT security personnel who are involved in their organizations’ enterprise PKI, distilling the findings in order to provide you with essential guidance. Read now to learn more.
-
Five Steps to Effective Third-Party Access Governance
Sponsored by: SaviyntAttracting and retaining employees has become more complicated. Most organizations don't know how many third-party relationships they have. Saviynt Identity Cloud combines multiple identity management capabilities into a single cohesive platform to unify controls and risk management for every identity, app, and cloud across your business.