Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"
-
Solve for X
Sponsored by: 8x8Download this guide to conversation AI in the contact center to learn the 4 big benefits of using AI for customer engagement, as well as 4 tips to create exceptional self-service experiences.
-
The Cloud Cost Optimization Imperative for Data-Intensive Workloads on Amazon EMR and Amazon EKS
Sponsored by: PepperdataExplore how Pepperdata Capacity Optimizer can reduce cloud waste and cost for data-intensive workloads like Apache Spark by up to 47% - automatically and autonomously, with no application changes required. Read the white paper to learn more.
-
Akamai Guardicore Segmentation PCI DSS Whitepaper
Sponsored by: Akamai TechnologiesA new assessment from GRSee indicates how Akamai Guardicore Segmentation can help organizations meet, support, or validate 9 of the 12 high-level requirements of Payment Card Industry Data Security Standard (PCI DSS) compliance. Get the third-party validation you need to start your segmentation project.
-
Veracode 10 Insights for DORA Compliance
Sponsored by: VeracodeThe Digital Operational Resilience Act (DORA) is vital for EU financial firms and third-party providers. So, how can you ensure your company complies? View this infographic to gain 10 insights for attaining DORA compliance.
-
The Secure Coding Handbook
Sponsored by: VeracodeThis 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
-
Revolutionizing The Low-Code Experience: The Power Of Generative AI
Sponsored by: ServiceNowDiscover how generative AI can revolutionize low-code development and boost developer productivity. Learn about the 4 key forces driving GenAI adoption and 4 best practices for getting started. Read the full report to unlock the power of GenAI for your enterprise.
-
Computer Weekly – 19 February 2019: When is it best to stick with paper?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer's guide examines the challenges of asset management as you move to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now.
-
Computer Weekly – 10 July 2018: Tackling the digital identity problem
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.
-
Executive Interview: Unleashing blockchain's potential
Sponsored by: TechTarget ComputerWeekly.comLabrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
-
Digital identity strategies to enhance data privacy and protect networks
Sponsored by: TechTarget ComputerWeekly.comThe rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.