ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Quarterly Ransomware Report Q1 2024

    Sponsored by: CyberMaxx

    To learn about trends in ransomware in Q1 2024, and to unlock predictions about ransomware in 2024, tap into this 6-page research report by CyberMaxx.

  • Attacker Economics

    Sponsored by: SailPoint Technologies

    Threat actors target privileged access to infiltrate systems, exfiltrate data, and disrupt operations. This infographic outlines the attacker economics behind these tactics and how an identity-first security strategy can improve cyber resilience. Read the full infographic to assess your identity security posture.

  • Top 10 networking stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Until Tuesday 10 December, it would have been absolutely fair to say that 2019 was the year of software-defined networking. And then, on 11 December, Cisco unveiled the basis of what it called the internet for the future. Hardware was very much back to the future. Here are Computer Weekly's top 10 networking stories of 2019.

  • 2023 Network IT Management Report: Evolving IT to Manage the New Network

    Sponsored by: Auvik Networks, Inc.

    To find out how 4,500 IT professionals approached network IT management in 2023, review this 23-page research report.

  • Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.

  • Unlock the Power of AI: Unleash the Power of Enterprise-Ready AI and Boost Your Entire Software Delivery Lifecycle

    Sponsored by: Digital.ai

    Read this e-book to discover how AI-Powered DevSecOps for the enterprise can increase innovation and accelerate the time-to-market at your company.

  • Business transformation through digital modernization

    Sponsored by: AWS

    Recent research suggests that over 90% of enterprises are accelerating cloud adoption plans due to the COVID-19 pandemic. While no two transformations are the same, breaking down the effort into two stages has proven beneficial. Read Business transformation through digital modernization to uncover the many ways AWS can help.

  • Identity Governance & Administration Solution Buyer’s Guide

    Sponsored by: Saviynt

    Over the last few years, cloud acceleration, security threats, and constant technology transformation have bombarded enterprises. IGA is fundamental to modern enterprise security. Importantly, IGA builds a foundation for Zero Trust across cloud, hybrid, and on-prem environments. Read on to learn more.

  • Navigating The Paths Of Risk The State of Exposure Management in 2024

    Sponsored by: XM Cyber

    In 2023, the XM Cyber Continuous Exposure Management (CEM) platform uncovered more than 40 million exposures. To access 7 key findings that these exposures illuminated, and to deepen your understanding of the state of exposure management in 2024, dig into this research report.

  • Computer Weekly – 10 April 2018: Technology is a lifesaver for NHS Blood and Transplant

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the CDO of the NHS's blood and transplant agency about how digital transformation is proving to be a real lifesaver. Our latest buyer's guide examines the state of public cloud. And we find out how Ireland is gaining a Brexit dividend to boost its tech sector. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.