ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"

  • Five Steps to Effective Third-Party Access Governance

    Sponsored by: Saviynt

    Attracting and retaining employees has become more complicated. Most organizations don't know how many third-party relationships they have. Saviynt Identity Cloud combines multiple identity management capabilities into a single cohesive platform to unify controls and risk management for every identity, app, and cloud across your business.

  • Computer Weekly – 8 October 2019: Showcasing the potential of 5G

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.

  • Computer Weekly – 7 November 2017: The ethics of software development

    Sponsored by: TechTarget ComputerWeekly.com

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

  • The DevSecOps Playbook Practical Steps for Producing Secure Software

    Sponsored by: Veracode, Inc.

    What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.

  • The DevSecOps Playbook

    Sponsored by: Veracode

    This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

  • The Devsecops Guide To Managing Open-Source Risk

    Sponsored by: Contrast Security

    As open-source software adoption grows, so do associated risks. This e-book examines how to establish visibility, manage policies, automate controls, and prioritize remediations to securely leverage open source without impacting DevOps. Read the full e-book to learn more.

  • IT Asset Management Optimize Expanding Technologies and Enterprise Asset Holding

    Sponsored by: ServiceNow

    Smarter approaches to asset management addresses the hidden asset cost gotchas; download this Gorilla Guide e-book to find out how.

  • ComputerWeekly's 50 Most Influential Women in IT 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we showcase some of the industry role models who break the stereotypical IT mold, and share opinions on what we can do to make the industry more diverse and inclusive.

  • Answering your 4 biggest questions about generative AI security

    Sponsored by: AWS

    In the eBook Answering Your 4 Biggest Questions about Generative AI Security, you will discover how to begin envisioning and implementing protective measures for your generative AI workloads.

  • Digital transformation: bridging the paper and digital gap

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprises are increasingly turning to traditional managed print service providers to improve process efficiency across both paper and digital information, says this report from analyst group, Quocirca.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.