Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"
-
Computer Weekly - 10 August 2021: Real-time data analytics in action
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.
-
Computer Weekly – 14 November 2017: How fashion is turning to tech to get closer to customers
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine how the fashion world and clothing retailers are using technology to better understand customers. Brexit continues to dominate conversation in the UK tech sector – we find out the hopes and fears of the industry. And we look at how to use OpenStack in a hyper-converged infrastructure. Read the issue now.
-
Trends In Zero Trust Strategies And Practices Remain Fragmented, But Many Are Seeing Success
Sponsored by: Portnox34% of organizations report having paused or abandoned a zero-trust project in the past, according to research by TechTarget’s Enterprise Strategy Group (ESG). To discover the drivers that informed that decision, and to explore other trends in zero trust, dig into this ESG research report.
-
Digital Transformation In HR: The 10-Step Guide
Sponsored by: SageThis 10-step guide provides a comprehensive approach to digital transformation in HR, from aligning goals to the business, to building a business case, and experimenting with new technologies. Learn how to drive business resilience and create amazing hybrid work experiences. Read the full Buyer's Guide.
-
Urban Myths About Secure Coding
Sponsored by: Veracode, Inc.Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.
-
A Computer Weekly buyer's guide to SIEM and SOAR
Sponsored by: TechTarget ComputerWeekly.comThe question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
-
Security Threats for Apps “In the Wild”
Sponsored by: Digital.aiDownload this study to learn how security professionals can safeguard their apps and users from malicious activities by illuminating and quantifying the threats to applications in the wild.
-
White Paper: A modern framework for automating data integration
Sponsored by: Software AGThis white paper explores a modern framework for automating data integration, covering key capabilities like subscription, scheduling, orchestration, and a metadata store. Read on now to learn how this framework can help your organization unlock the power of data self-service.
-
Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
-
How University Of Michigan Health-West Improved Clinician Wellbeing
Sponsored by: Microsoft and NuanceFacing burnout, University of Michigan Health-West clinicians used Nuance's Dragon Ambient eXperience to convert conversations into notes, boosting satisfaction and productivity. High users saw 12 extra patients and 20 more wRVUs monthly, with revenue yielding an 80% ROI. Discover how voice tech enhanced clinician experience.