Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
PLM in your pocket handy and smart business processes via app
Sponsored by: RevalizeDiscover how manufacturing companies can use app technology to centralize business processes and minimize complexity. Learn how the PRO.FILE FLEX app enables mobile access to PLM functions and information for increased efficiency and flexibility. Read the White Paper to learn more.
-
IDC MarketScape: Worldwide Governance Administration for Identity Security 2022 Vendor Assessment
Sponsored by: SailPoint TechnologiesTraditionally, identity governance administration (IGA) was called the passive side of governance, where organizations would implement largely on premises to improve their regulatory compliance positions. This report provides an overview of the current IGA solution market, highlighting and comparing the leading vendors. Read on to learn more.
-
5 Key Capabilities to Secure Against Endpoint Risk
Sponsored by: CrowdStrikeLegacy endpoint security solutions don’t just miss modern threats — they slow down security operations, drain resources, and increase overall risk. In this eBook, uncover five key capabilities for a modern endpoint security approach and see how improved detection capabilities protect against all types of threats.
-
What Does a Good Trace Look Like?
Sponsored by: HoneycombWhat does a good trace look like? In this e-book by Honeycomb, learn about 7 key characteristics of a successful trace and review an example of good tracing.
-
Scaling B2B Demand for Authentic Connections
Sponsored by: BrightTALK by TechTargetIn this eBook, learn how to effectively reach and convert targets at scale. Download your copy to explore new perspectives and methodologies on how to balance the crucial and competing needs for scale and depth of connections with your audience.
-
Building an AI strategy: Telcos put the foundations in place
Sponsored by: AWSThis report – based on interviews with 20 of the world’s largest and leading CSPs globally, plus a survey of 104 executives across 73 telcos worldwide – sets out to evaluate where operators are with their AI strategies and what they need to do to make them fit for the future and deployed at scale.
-
Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
Sponsored by: TechTarget ComputerWeekly.comDavid Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
-
Arctic Wolf Security Operations 2024 Report
Sponsored by: Arctic WolfThis report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.
-
Ebook - Content Synd - Zero Trust Explained: Ultimate Guide to Zero Trust Security
Sponsored by: StrongDMDownload this ebook explore Zero Trust security, including its benefits, best practices, and common barriers to implementation. You’ll gain a deeper understanding of Zero Trust models like ZTAA and ZTNA and learn the tools and techniques you need to apply frictionless Zero Trust access control to your infrastructure.
-
Computer Weekly – 21 August 2018: Delivering the potential of the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.