ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • The Evolution of AI in Cybersecurity: Breaking the Cycle of Reactionary Cybersecurity

    Sponsored by: Deep Instinct

    While security teams strive to combat new threats as fast as they can, as long as their approach is reactionary, hackers will always have the upper hand. This white paper examines how the adoption of AI and ML presents an opportunity to overcome reactionary approaches and achieve proactive anti-malware security. Read on to learn more.

  • CW APAC: Buyer's guide to SASE

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

  • Beyond the GenAI Hype - Real World Investments Use Cases and Concerns

    Sponsored by: Enterprise Strategy Group

    As the generative AI (GenAI) market accelerates, your business, like every business, is pressured to keep up. To strengthen your understanding of the present state of GenAI – including challenge areas, use cases and budget strategies – review this report by TechTarget’s Enterprise Strategy Group (ESG).

  • Transform Your Sales Team’s Productivity With Slack.

    Sponsored by: Slack

    Today, sales teams can grapple with reaching revenue targets and excelling in customer service. Studies show sales reps only spend 28% of their time selling, with the rest lost to admin tasks in various apps, creating productivity blocks and information silos. Access this white paper to discover more.

  • ServiceOps 2024: Automation and (gen)AI-powered IT service and operations

    Sponsored by: ServiceNow

    ServiceOps just makes sense. It is practical and makes everyone’s job easier… but how can you adopt without requiring major disruption in day-to-day realities? Find out in this research report.

  • Building a Cyberresilient Data Recovery Strategy

    Sponsored by: Veeam Software

    Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.

  • Longitudinal Adherence Monitoring Program (LAMP)

    Sponsored by: Innovaccer

    It’s easy to assume that if people are given the right information, they will make decisions in their best interest. But that isn’t always the case. People are irrational, but in predictable ways. Discover how adherence monitoring can have more of an impact than treatment itself in this resource.

  • 2024 State of Application Security Report

    Sponsored by: CrowdStrike

    8 of the top 10 data breaches of 2023 were related to application attack surfaces. This report synthesizes data collected from a survey of application security professionals to reflect the current state of application security, condensing the findings into 8 key takeaways. Download now to learn more.

  • Mortimer Spinks and Computer Weekly Women in IT survey 2016

    Sponsored by: TechTarget ComputerWeekly.com

    The Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 16 March 2016 and 11 May 2016 and represents the views of 3,706 technology professionals across 75 countries.

  • Taking Linux in the enterprise to a new level

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.