ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Domain Name System (DNS) Security

    Sponsored by: Cisco

    SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.

  • A 4-Step Plan For Denial Prevention

    Sponsored by: Waystar

    What do you do when staff don’t have the time, money, or resources to work denials as thoroughly as they’d like? The technology and tactics to prevent denials is here and you can unlock a proven approach to denial prevention. Get a step-by-step denial prevention plan in this e-book.

  • HOW TO KEEP UP WITH THE RAPIDLY EXPANDING SCOPE OF THE OWASP TOP TEN

    Sponsored by: Contrast Security

    The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.

  • Looking To Make Digital Transformation A Reality?

    Sponsored by: Lemongrass

    Discover in this e-book why it’s time to rethink how you run enterprise applications, and how cloud tools can empower you to build a truly collaborative workplace.

  • Risk in the World of Identity Governance

    Sponsored by: One Identity

    As the network perimeter expands, identity is the new enterprise security frontier. This white paper explores how identity governance and administration (IGA) can mitigate identity-based risks through prevention, detection, remediation, and prediction. Learn how IGA secures the dynamic enterprise perimeter.

  • 2024 Top Global Security Trends

    Sponsored by: Brivo

    This report presents the findings of Brivo’s recent security study, which gathers data from 850 security professionals across 8 countries. Download the report now to unlock the study’s key findings, including 3 key trends influencing the state of cybersecurity.

  • How To Choose An HR System: The Ultimate Guide

    Sponsored by: Sage

    Navigating the evolving work landscape, selecting the right HR technology is essential. This guide covers choosing an HR system that benefits all, from HR to the C-suite. Learn the key features for streamlining, enhancing productivity, and achieving workforce visibility. Download to find the ideal HR system for your business.

  • Guide to business continuity planning during COVID-19

    Sponsored by: TechTarget ComputerWeekly.com

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

  • Making The Case: The ROI Of Demand Management

    Sponsored by: SAS

    This white paper explores how to quantify the return on investment (ROI) from improving demand planning. It provides templates to document the impact of demand planning on business decisions and calculate the financial benefits. Read on to learn how to build a compelling case for investing in demand planning improvements.

  • Alchera, an AI Image Recognition Company, Improves Profits with License Management Solution Sentinel

    Sponsored by: Thales

    Alchera, a leading AI image recognition company, has developed cutting-edge technology with 99.99% accuracy. Its solutions are used in various industries, from finance to security. Learn how Alchera's flexible license management with Thales Sentinel helps expand its global reach and customer satisfaction. Read the full content for more details.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.