Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
SIEM, SOAR or both? Our security experts weigh in
Sponsored by: TechTarget ComputerWeekly.comIn this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
-
Building a culture for SaaS success
Sponsored by: AWSThis e-book explores how to put your customers first, manage costs, and tie it all together with Product-Led Growth to set your software company up for lasting SaaS success. Access the e-book to learn more.
-
Computer Weekly - 8 March 2022: Using technology to protect human rights
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we investigate how technology is being used to tackle human rights abuses worldwide. We offer a step-by-step guide to disaster recovery in the cloud era. And we examine the vital, and successful, role of digital and data in the UK Covid-19 vaccine roll-out. Read the issue now.
-
2024 Ransomware Trends Report Platform Asset
Sponsored by: Veeam SoftwareThis year’s report surveyed 1,200 CISOs , security professionals, and backup administrators whose organizations suffered at least one ransomware attack in 2023. Download this report to learn about the targets and impacts of ransomware attacks, the financial impact, cyber insurance, and the cost of team misalignment.
-
2024 Data Protection Trends Report
Sponsored by: Veeam SoftwareThe global data protection market continues to grow. In this new research report, 1,200 business and IT leaders were surveyed on their IT and data protection strategies, including their plans for 2024 and beyond. Download the 2024 Data Protection Trends report to learn more.
-
A 7-Step Risk Assessment Framework For Cybersecurity Professionals
Sponsored by: VikingCloudCybersecurity threats are on the rise, with 78% more breaches in the U.S. in 2023. This white paper outlines a 7-step risk assessment framework to help cybersecurity professionals identify critical assets, assess vulnerabilities, mitigate risks, and build cyber resilience. Read the full white paper to learn more.
-
CW ASEAN – January 2019: Dive into microservices
Sponsored by: TechTarget ComputerWeekly.comIn this edition of CW ASEAN, we uncover the state of adoption of microservices in ASEAN and what needs to be in place for enterprises to get the most out of the technology.
-
Raspberry PI with Java: programming the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
-
Enterprise mobility management software offerings and use cases
Sponsored by: TechTarget ComputerWeekly.comEnterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.
-
Top 10 telecoms stories of 2019
Sponsored by: TechTarget ComputerWeekly.comTo paraphrase the eternally wonderful Sesame Street: this year's telecoms industry has been brought to you by the number "5", and the letter's "G" and "H". Here is Computer Weekly's top 10 list of what was driving the telecoms industry during 2019.