Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
The Evolution of AI in Cybersecurity: Breaking the Cycle of Reactionary Cybersecurity
Sponsored by: Deep InstinctWhile security teams strive to combat new threats as fast as they can, as long as their approach is reactionary, hackers will always have the upper hand. This white paper examines how the adoption of AI and ML presents an opportunity to overcome reactionary approaches and achieve proactive anti-malware security. Read on to learn more.
-
CW APAC: Buyer's guide to SASE
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.
-
Beyond the GenAI Hype - Real World Investments Use Cases and Concerns
Sponsored by: Enterprise Strategy GroupAs the generative AI (GenAI) market accelerates, your business, like every business, is pressured to keep up. To strengthen your understanding of the present state of GenAI – including challenge areas, use cases and budget strategies – review this report by TechTarget’s Enterprise Strategy Group (ESG).
-
Transform Your Sales Team’s Productivity With Slack.
Sponsored by: SlackToday, sales teams can grapple with reaching revenue targets and excelling in customer service. Studies show sales reps only spend 28% of their time selling, with the rest lost to admin tasks in various apps, creating productivity blocks and information silos. Access this white paper to discover more.
-
ServiceOps 2024: Automation and (gen)AI-powered IT service and operations
Sponsored by: ServiceNowServiceOps just makes sense. It is practical and makes everyone’s job easier… but how can you adopt without requiring major disruption in day-to-day realities? Find out in this research report.
-
Building a Cyberresilient Data Recovery Strategy
Sponsored by: Veeam SoftwareBuilding a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.
-
Longitudinal Adherence Monitoring Program (LAMP)
Sponsored by: InnovaccerIt’s easy to assume that if people are given the right information, they will make decisions in their best interest. But that isn’t always the case. People are irrational, but in predictable ways. Discover how adherence monitoring can have more of an impact than treatment itself in this resource.
-
2024 State of Application Security Report
Sponsored by: CrowdStrike8 of the top 10 data breaches of 2023 were related to application attack surfaces. This report synthesizes data collected from a survey of application security professionals to reflect the current state of application security, condensing the findings into 8 key takeaways. Download now to learn more.
-
Mortimer Spinks and Computer Weekly Women in IT survey 2016
Sponsored by: TechTarget ComputerWeekly.comThe Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 16 March 2016 and 11 May 2016 and represents the views of 3,706 technology professionals across 75 countries.
-
Taking Linux in the enterprise to a new level
Sponsored by: TechTarget ComputerWeekly.comIn this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.