Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Europe's controversial digital vision for the next decade
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.
-
Top 10 India IT stories of 2022
Sponsored by: TechTarget ComputerWeekly.comIn this roundup, we recap the top 10 stories in India, including the digitisation work undertaken by global firms in the country, progress made by local enterprises in harnessing technology and how a female coder rose through the ranks in her software development career.
-
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
-
A guide to evaluating ambient and AI clinical solutions
Sponsored by: Microsoft and NuanceAs the ambient AI market heats up, healthcare organizations must evaluate vendors' experience, expertise, technology leadership, scalability, and support. Download this eBook to learn the critical factors to consider when selecting an AI clinical partner.
-
Defining the datacentre needs of 21st century enterprises
Sponsored by: TechTarget ComputerWeekly.comThis guide is designed to provide IT leaders with some insight into how their peers are addressing current problems through the use of cloud and colocation, and shine a light on how the analyst community sees the role of the datacentre changing over time.
-
A Computer Weekly buyer's guide to application modernisation
Sponsored by: TechTarget ComputerWeekly.comIn this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.
-
How revenue cycle management's security requirements are evolving
Sponsored by: XtelligentMedia HealthcareThe recent cybersecurity attack on Change Healthcare has revenue cycle management vendors and clients prioritizing security and system changes.
-
How security requirements for revenue cycle management are changing
Sponsored by: XtelligentMedia HealthcareThe recent cybersecurity attack on Change Healthcare has revenue cycle management vendors and clients prioritizing security and system changes.
-
Top 10 retail technology stories of 2019
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly looks at what 2019 had in store for the retail industry – what technologies were retailers rushing to adopt and how is customer behaviour changing?
-
Protect Passwords, Don’t Just Manage Them
Sponsored by: CyberArkWhen 921 password attacks occur per second, it’s time to treat everyday employees’ credentials like the true operational risk they are. In this whitepaper, CyberArk Chief Information Officer Omer Grossman provides a CIO’s perspective on password-related risks keeping security leaders up at night.