ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • CW Europe – June 2017

    Sponsored by: TechTarget ComputerWeekly.com

    This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.

  • CW APAC - January 2021: Trend Watch - CIO trends

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly reviews some key IT trends that are likely to shape the industry in 2021.

  • Top 14 ransomware targets in 2023 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.

  • Computer Weekly – 16 August 2016: Barriers to UK datacentre expansion

    Sponsored by: TechTarget ComputerWeekly.com

    A TechUK survey has found that the UK tech sector's confidence of growth over the next two years has dropped by 23 points, due to Brexit. In this week's issue, we look at how Asian investors are pulling out of datacentre investments. According to datacentre analyst Broadgroup, these investors have been quite spooked by the Brexit vote.

  • 20 Ways to Boost Your MSP’s Productivity, Efficiency & Profitability With Auvik

    Sponsored by: Auvik Networks, Inc.

    In this 17-page e-book, discover 20 ways that you can enhance productivity and profitability at your MSP.

  • A Better Toolkit for Finding and Converting More Real Leads

    Sponsored by: TechTarget

    Though foundational to B2B marketing, lead generation can pose a couple significant obstacles. Along with unpacking those challenges, this 21-page e-book by TechTarget maps out 3 tips for driving stronger leads from your business’s lead generation strategy. To access those insights and more, dig into the book.

  • Open Your Poss Ibilities with Red Hat and Google Cloud

    Sponsored by: Red Hat

    Learn how Red Hat and Google Cloud can help you build a flexible, secure, and efficient hybrid cloud environment to support your business. Download this white paper to discover strategies for modernizing your IT infrastructure, automating your operations, and accelerating application development.

  • CW APAC - January 2020: Trend Watch - digital disruption

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on digital disruption in the Asia-Pacific region, Computer Weekly looks at how business and IT leaders can implement a coherent and cohesive approach to digital transformation. Download the handbook now.

  • How to Create a SaaS Spend Management Strategy

    Sponsored by: Auvik Networks, Inc.

    In this white paper, unlock a 4-step roadmap for developing a SaaS spend management strategy.

  • Scaling Threat Detection & Response

    Sponsored by: Coalition

    As organizations continue to search for new ways to reduce costs while staying better protected, many IT leaders have turned to building their active threat mitigation strategies, including managed detection and response (MDR) tactics. But what exactly is MDR? Browse this guide to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.