Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"
-
Five Steps to Effective Third-Party Access Governance
Sponsored by: SaviyntAttracting and retaining employees has become more complicated. Most organizations don't know how many third-party relationships they have. Saviynt Identity Cloud combines multiple identity management capabilities into a single cohesive platform to unify controls and risk management for every identity, app, and cloud across your business.
-
Computer Weekly – 8 October 2019: Showcasing the potential of 5G
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
-
Computer Weekly – 7 November 2017: The ethics of software development
Sponsored by: TechTarget ComputerWeekly.comTake a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
-
The DevSecOps Playbook Practical Steps for Producing Secure Software
Sponsored by: Veracode, Inc.What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.
-
The DevSecOps Playbook
Sponsored by: VeracodeThis e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.
-
The Devsecops Guide To Managing Open-Source Risk
Sponsored by: Contrast SecurityAs open-source software adoption grows, so do associated risks. This e-book examines how to establish visibility, manage policies, automate controls, and prioritize remediations to securely leverage open source without impacting DevOps. Read the full e-book to learn more.
-
IT Asset Management Optimize Expanding Technologies and Enterprise Asset Holding
Sponsored by: ServiceNowSmarter approaches to asset management addresses the hidden asset cost gotchas; download this Gorilla Guide e-book to find out how.
-
ComputerWeekly's 50 Most Influential Women in IT 2018
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we showcase some of the industry role models who break the stereotypical IT mold, and share opinions on what we can do to make the industry more diverse and inclusive.
-
Answering your 4 biggest questions about generative AI security
Sponsored by: AWSIn the eBook Answering Your 4 Biggest Questions about Generative AI Security, you will discover how to begin envisioning and implementing protective measures for your generative AI workloads.
-
Digital transformation: bridging the paper and digital gap
Sponsored by: TechTarget ComputerWeekly.comEnterprises are increasingly turning to traditional managed print service providers to improve process efficiency across both paper and digital information, says this report from analyst group, Quocirca.