ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • SIEM, SOAR or both? Our security experts weigh in

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).

  • Building a culture for SaaS success

    Sponsored by: AWS

    This e-book explores how to put your customers first, manage costs, and tie it all together with Product-Led Growth to set your software company up for lasting SaaS success. Access the e-book to learn more.

  • Computer Weekly - 8 March 2022: Using technology to protect human rights

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we investigate how technology is being used to tackle human rights abuses worldwide. We offer a step-by-step guide to disaster recovery in the cloud era. And we examine the vital, and successful, role of digital and data in the UK Covid-19 vaccine roll-out. Read the issue now.

  • 2024 Ransomware Trends Report Platform Asset

    Sponsored by: Veeam Software

    This year’s report surveyed 1,200 CISOs , security professionals, and backup administrators whose organizations suffered at least one ransomware attack in 2023. Download this report to learn about the targets and impacts of ransomware attacks, the financial impact, cyber insurance, and the cost of team misalignment.

  • 2024 Data Protection Trends Report

    Sponsored by: Veeam Software

    The global data protection market continues to grow. In this new research report, 1,200 business and IT leaders were surveyed on their IT and data protection strategies, including their plans for 2024 and beyond. Download the 2024 Data Protection Trends report to learn more.

  • A 7-Step Risk Assessment Framework For Cybersecurity Professionals

    Sponsored by: VikingCloud

    Cybersecurity threats are on the rise, with 78% more breaches in the U.S. in 2023. This white paper outlines a 7-step risk assessment framework to help cybersecurity professionals identify critical assets, assess vulnerabilities, mitigate risks, and build cyber resilience. Read the full white paper to learn more.

  • CW ASEAN – January 2019: Dive into microservices

    Sponsored by: TechTarget ComputerWeekly.com

    In this edition of CW ASEAN, we uncover the state of adoption of microservices in ASEAN and what needs to be in place for enterprises to get the most out of the technology.

  • Raspberry PI with Java: programming the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Enterprise mobility management software offerings and use cases

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.

  • Top 10 telecoms stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    To paraphrase the eternally wonderful Sesame Street: this year's telecoms industry has been brought to you by the number "5", and the letter's "G" and "H". Here is Computer Weekly's top 10 list of what was driving the telecoms industry during 2019.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.