Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company
Sponsored by: TechTarget ComputerWeekly.comIt's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.
-
Chapter 1: Security and Risk Management
Sponsored by: McGraw HillIn this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
-
Transform your Applications
Sponsored by: Red HatAzure Red Hat OpenShift provides a unified, cloud-based application platform to modernize apps, build cloud-native services, and accelerate innovation. Unlock new business possibilities with expert-managed hybrid cloud services. Read the full white paper to learn more.
-
Liberate Data and Modernize your Network for AI and LLM with Aviatrix
Sponsored by: Aviatrix SystemsAviatrix's cloud networking platform enables enterprises to secure and optimize hybrid networks for AI and large language model workloads. It provides high-performance encryption, deep observability, and cost savings. Learn more about Aviatrix's cloud networking solutions.
-
Zscaler ThreatLabz 2024 Phishing Report
Sponsored by: ZscalerThe Zscaler ThreatLabz 2024 Phishing Report examines the evolving phishing landscape, including the impact of AI, top targeted industries, and emerging tactics like vishing and browser-in-the-browser attacks. Learn how to enhance your organization's phishing defenses by reading the full report.
-
Zscaler ThreatLabz 2024 Phishing Report
Sponsored by: ZscalerZscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.
-
Migrate to AWS Simply and Securely with Zscaler
Sponsored by: ZscalerAs organizations migrate applications to the cloud, securing access to internal apps can be challenging. This e-book explores how Zscaler Private Access (ZPA) can accelerate application migration to AWS while enhancing security and user experience. Keep reading to unlock 13 pages of insights.
-
SHEDDING LIGHT ON OEM STORAGE SUPPORT
Sponsored by: Service ExpressIf you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.
-
Asynchronous Telemedicine Guide + COVID-19: The Largest Case Study on Async
Sponsored by: Fabric HealthDiscover the power of asynchronous care, the most efficient care delivery method. Based on over 15 years of experience in async, this comprehensive 29-page resource includes everything you need to know to implement an effective virtual-first strategy that enhances provider capacity, expands patient access, and offers a consumer-grade experience.
-
EU data protection: Essential guide
Sponsored by: TechTarget ComputerWeekly.comThe European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.