ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • MicroScope – February 2022: Spotting the hidden security dangers

    Sponsored by: MicroScope

    In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate

  • Computer Weekly – 21 March 2023: The risks of an imbalance in AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.

  • CW APAC - January 2021: Trend Watch - CIO trends

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly reviews some key IT trends that are likely to shape the industry in 2021.

  • Top 14 ransomware targets in 2023 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.

  • 7 trends shaping the future of tax

    Sponsored by: SAS

    This e-book explores 7 key trends shaping the future of tax, including the explosion in data sharing, use of AI against tax agencies, and the need to get tax right the first time. Inside, you’ll discover how tax agencies can leverage data and analytics to tackle these challenges and more. Read the full report now to learn more.

  • The State of ‘Security by Design’

    Sponsored by: Brivo

    Is security an afterthought in building design? In order to answer this question and understand the state of security by design, Brivo commissioned a study involving 800 decision-makers deeply entrenched in the realms of architectural or engineering processes. Read on to learn more.

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • CW Middle East ezine October 2018

    Sponsored by: TechTarget ComputerWeekly.com

    It's still early days for the Middle East when it comes to artificial intelligence and robotic process automation, but things are picking up.

  • E-guide: DevOps trends in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    Across the APAC region, organisations have been ramping up on agile development efforts to stay ahead of the competition. DevOps, in particular, has been gaining ground as a way to bring together development and operations teams, thereby increasing software quality and stability, and shortening time to market.

  • What is Zero Trust?

    Sponsored by: Trend Micro

    This e-book, What is Zero Trust? (Really), teaches you exactly what Zero Trust really is. Dive into the e-book here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.