Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"
-
ComputerWeekly's 50 Most Influential Women in IT 2018
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we showcase some of the industry role models who break the stereotypical IT mold, and share opinions on what we can do to make the industry more diverse and inclusive.
-
15 Machine Learning Use Cases to Solve Everyday Business Problems
Sponsored by: AlteryxWhen most people think about machine learning, they assume it’s a complex form of AI beyond their reach, requiring hours of coding and complex algorithms to create functional models. But with modern analytics solutions like Alteryx, anyone can create and automate ML models in minutes. Read on to discover 15 use cases for immediate business impact.
-
The Total Economic Impact™ Of Cloudflare’s Connectivity Cloud
Sponsored by: CloudflareCloudflare's connectivity cloud can help enterprises reduce complexity, improve security, and boost productivity. Learn how it can deliver cost savings and business benefits in this Forrester Total Economic Impact study. Read the full report to explore the potential ROI.
-
The Ultimate Guide to Cyber Hygiene
Sponsored by: TaniumIt’s critical for organizations to deeply understand their risk posture and have tools in place that provide the endpoint visibility and control needed to detect and remediate security breaches. This white paper provides the benchmarks and security strategies that set IT teams up for success in proactively planning defenses against cyber threats.
-
Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.
-
Computer Weekly – 4 July 2017: Be better connected in a wireless world
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.
-
2024 PKI and Post-Quantum Trends Study
Sponsored by: Entrust, Inc.In this report, Ponemon Institute presents the findings based on a survey of 2,176 IT and IT security personnel who are involved in their organizations’ enterprise PKI, distilling the findings in order to provide you with essential guidance. Read now to learn more.
-
RPA vs. BPM: How are they different?
Sponsored by: TechTarget ComputerWeekly.comRobotic process automation and business process management are complementary partners in driving digital transformation initiatives. RPA has received a lot more publicity in recent years, but BPM is an essential discipline and a key enabler in scaling RPA projects. Here are the main differences between these process-oriented initiatives.
-
Government Intervention, The Rise Of The SBOM And The Evolution Of Software Supply Chain Security
Sponsored by: SonatypeHow are regulatory initiatives like the Biden administration’s “Securing Open Source Software Act” impacting software development and security? To find out, Censuswide surveyed 217 IT directors. Review the findings in this 9-page report by Sonatype.
-
Essential Guide: APAC women in cyber security
Sponsored by: TechTarget ComputerWeekly.comIn Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.