ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"

  • Solve for X

    Sponsored by: 8x8

    Download this guide to conversation AI in the contact center to learn the 4 big benefits of using AI for customer engagement, as well as 4 tips to create exceptional self-service experiences.

  • The Cloud Cost Optimization Imperative for Data-Intensive Workloads on Amazon EMR and Amazon EKS

    Sponsored by: Pepperdata

    Explore how Pepperdata Capacity Optimizer can reduce cloud waste and cost for data-intensive workloads like Apache Spark by up to 47% - automatically and autonomously, with no application changes required. Read the white paper to learn more.

  • Akamai Guardicore Segmentation PCI DSS Whitepaper

    Sponsored by: Akamai Technologies

    A new assessment from GRSee indicates how Akamai Guardicore Segmentation can help organizations meet, support, or validate 9 of the 12 high-level requirements of Payment Card Industry Data Security Standard (PCI DSS) compliance. Get the third-party validation you need to start your segmentation project.

  • Veracode 10 Insights for DORA Compliance

    Sponsored by: Veracode

    The Digital Operational Resilience Act (DORA) is vital for EU financial firms and third-party providers. So, how can you ensure your company complies? View this infographic to gain 10 insights for attaining DORA compliance.

  • The Secure Coding Handbook

    Sponsored by: Veracode

    This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.

  • Revolutionizing The Low-Code Experience: The Power Of Generative AI

    Sponsored by: ServiceNow

    Discover how generative AI can revolutionize low-code development and boost developer productivity. Learn about the 4 key forces driving GenAI adoption and 4 best practices for getting started. Read the full report to unlock the power of GenAI for your enterprise.

  • Computer Weekly – 19 February 2019: When is it best to stick with paper?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer's guide examines the challenges of asset management as you move to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now.

  • Computer Weekly – 10 July 2018: Tackling the digital identity problem

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.

  • Executive Interview: Unleashing blockchain's potential

    Sponsored by: TechTarget ComputerWeekly.com

    Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.