Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Digital Disruption Index – from experimentation to transformation
Sponsored by: TechTarget ComputerWeekly.comOrganisations are investing in digital technologies, including artificial intelligence, blockchain and augmented reality, but executives fear they lack skills to implement a digital strategy, Deloitte's Digital Disruption Index reveals.
-
Don’t drown in data debt; champion your Data First culture
Sponsored by: SynitiModern enterprises are struggling with data debt, as over 40% of data is unusable. This creates lost opportunity cost. To harness data's full power, enterprises must champion a "Data First" culture, address data quality, and partner with specialized data providers. Download this report to learn how you can reduce your data debt.
-
How financial services organisations can build agility and increase resilience against the cyber security storm
Sponsored by: VodafoneThe finance industry is going through a turbulent storm full of new challenges and concerns. Read this eBook for a deep dive into what issues financial services organizations are facing and how technology can help you be better prepared to overcome the challenges of today and the future.
-
Gamma International: The Macedonia files
Sponsored by: TechTarget ComputerWeekly.comThis PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
-
The essential guide to understanding AI for SMB and Mid Market leaders in Australia and New Zealand
Sponsored by: Schneider ElectricIn this white paper, explore the most important trends of AI workloads and today’s top data center challenges, and discover essential guidance to address these challenges for each physical infrastructure category—including power, cooling, racks, and software management, and more.
-
SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
Sponsored by: Veracode, Inc.If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
-
Top 10 Australian IT stories of 2020
Sponsored by: TechTarget ComputerWeekly.comAgainst all odds, the Australian people and businesses proved their mettle, becoming one of the first countries in the world to emerge from the pandemic. Companies pivoted quickly and adopted new business models while supercharging digitisation initiatives at an unprecedented pace. Here are Computer Weekly's top 10 Australia IT stories of 2020:
-
Launch, differentiate, and grow your business on AWS
Sponsored by: AWSDiscover how AWS enables ISVs to build, market, and scale innovative applications. Leverage the most comprehensive set of AI, ML, and security services to drive technical advances, expand reach, and boost productivity. Learn more about building modern applications on AWS.
-
Computer Weekly – 4 July 2017: Be better connected in a wireless world
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.
-
Top 10 Australia IT stories of 2018
Sponsored by: TechTarget ComputerWeekly.comIn this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.