ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Nordics' IT leaders facing the coronavirus crisis

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at some of the innovations, in the region, that are addressing Covid-19 challenges. But we also feature news that many tech startups in the region might soon face problems innovating at all as investment funds dry up.

  • Edge and Industrial IoT at Scale

    Sponsored by: SUSE

    In this 57-page Gorilla Guide you’ll learn how to employ best practices in edge computing that include the use of open source platforms, the integration of information technology (IT) and operations technology (OT) and the use of validated designs. Access the guide.

  • Application security: best practices and risks

    Sponsored by: TechTarget ComputerWeekly.com

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

  • Top 10 storage stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly's storage content decodes trends and offers practical and technical advice. So, looking at the key storage stories of 2019, we see all the main developments reflected.

  • Computer Weekly – 2 May 2023: The ethics of military AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the defence sector looks into using AI to create autonomous weapons, we examine the risks and ethics of military AI. AWS is under fire for not providing vital emissions data to customers – we investigate. And we find out what IT security teams can learn from cyber warfare in Ukraine. Read the issue now.

  • MicroScope – September 2023: Channel pushes on against the odds

    Sponsored by: MicroScope

    In this issue, we take a look at the struggles and triumphs faced by the channel this year so far. Also read up on possible solutions to the skills shortage, including the opening up of STEM to a more diverse range of students, and the necessity for improving skills on the job.

  • Learn in VR

    Sponsored by: SHI International

    In this e-book, you’ll find out how to unlock the full potential of your R1 institution with the combined expertise of SHI and Meta. This partnership offers cutting-edge AI and VR technologies from Meta, designed to elevate research capabilities and create immersive educational experiences. Read on now to learn more.

  • CleanINTERNET® for Azure CLOUD ENVIRONMENTS

    Sponsored by: Centripetal Networks

    Many enterprises have accidentally exposed critical data via their public cloud infrastructure because of misconfigurations or lax policies. Explore the full benefits of a new cloud security offering, Centripetal’s CleanINTERNET® designed to defend your assets from cyber threats by leveraging dynamic threat intelligence on a mass scale.

  • Ebook - Content Synd - Zero Trust Explained: Ultimate Guide to Zero Trust Security

    Sponsored by: StrongDM

    Download this ebook explore Zero Trust security, including its benefits, best practices, and common barriers to implementation. You’ll gain a deeper understanding of Zero Trust models like ZTAA and ZTNA and learn the tools and techniques you need to apply frictionless Zero Trust access control to your infrastructure.

  • The Home Depot Nails Retail Challenges with SailPoint

    Sponsored by: SailPoint Technologies

    As the retail industry undergoes digital transformation, The Home Depot leveraged SailPoint's identity solutions to boost productivity, improve associate experience, and reduce risk. Learn how they addressed compliance, consolidated disparate technologies, and enhanced security controls in this case study.[Read the full case study]

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.