ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Security Think Tank: Critical National Infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

  • Built-in AI Assistance Streamlines Visibility and Improves Threat Response in Fortinet FortiAnalyzer

    Sponsored by: Fortinet, Inc.

    Fortinet's FortiAnalyzer provides AI-assisted security operations to help analysts detect and respond to advanced threats. It consolidates security data, automates threat detection and response, and offers built-in AI guidance to streamline investigations. Download this solution brief to learn more.

  • Simplify desktop management and reduce costs by up to 40%

    Sponsored by: DellEMC and Intel®

    This white paper goes over what organizations have to gain - and lose - from virtual desktop technology.

  • A Computer Weekly buyer's guide to secure and agile app development

    Sponsored by: TechTarget ComputerWeekly.com

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

  • Why Okta for Identity

    Sponsored by: Okta

    Identity has always operated as the metaphorical front door to an organization. That means, when hackers leverage stolen credentials, initiating an attack is as simple as walking through the front door. Download this white paper more than 18,000 customers choose Okta for IAM.

  • MicroScope - December 2021: Valuing the MSP

    Sponsored by: MicroScope

    In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.

  • Leveraging Automation to Achieve DevSecOps for Secure Web Applications and APIs

    Sponsored by: Veracode, Inc.

    To find out how your teams can deliver more secure software faster, take a look through this white paper, "Leveraging Automation to Achieve DevSecOps for Secure Web Applications and APIs."

  • Agile today & tomorrow: Shaping organizational transformation

    Sponsored by: Appfire

    Appfire and Vanson Bourne surveyed 450 global technology decision-makers and found that 94% of their organizations use agile methodologies, with budgets up by 10% on average. This e-book explores the trends, challenges, maturity levels, and future of agile implementation in organizations like yours. Download your copy to access its chapters.

  • Top IT challenges for healthcare organizations in rural areas

    Sponsored by: XtelligentMedia Healthcare

    Rural healthcare providers have long faced challenges surrounding their geographical isolation and limited financial resources. However, the digital health transformation has ushered in a new set of rural health IT challenges.

  • Six Critical Capabilities of Saviynt’s Application Access Governance

    Sponsored by: Saviynt

    Moving to Zero Trust can improve security while enabling users with right-time, right-level access. The process requires moving from a mindset of implicit trust to the continuous re-evaluation of risk. Read this white paper to learn more about the three key aspects to a successful Zero Trust adoption.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.