ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • A Computer Weekly Buyers Guide to 5G

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.

  • Computer Weekly – 28 May 2024: Digital border problems are stacking up

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the government's post-Brexit plans for digital borders as problems begin to emerge. We find out about AI PCs and ask whether they will make any difference for enterprise IT. And we talk to Red Hat CEO Matt Hicks about the open source opportunities from AI. Read the issue now.

  • Dutch organisations demand more from government

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

  • Want to Secure Your Hybrid Workforce with ZTNA?

    Sponsored by: Zscaler

    Given the crowded nature of the zero trust network access (ZTNA) market, security professionals are forced to decipher what makes one ZTNA product stand apart from the rest. To find out 10 key, standout features of a ZTNA solution, review this e-book.

  • Understanding Gmail And Yahoo’s New Standards For Senders

    Sponsored by: Sinch

    Gmail and Yahoo are changing email-sending requirements in 2024. Learn how to ensure your domain settings, unsubscribe links, and spam rates align with the new protocols to avoid getting blocked from major inboxes. Access the guide to understand the remediation steps.

  • The Internet Outage Survival Guide: Unpacking common outages types and how they impact your business

    Sponsored by: Cisco ThousandEyes

    Today, business rely on the Internet more than ever. Yet, the Internet is as unpredictable as it is critical. It's a "best-effort" collection of networks connecting a myriad of providers, and at its very core, the Internet is vulnerable to outages. In this e-book, learn how you can mitigate the risk of an Internet outage.

  • The Federal Data Maturity Report: Optimizing Storage, Operations, and Insights.

    Sponsored by: Hitachi Vantara

    Federal agencies are struggling to manage surging data volumes, with over half feeling their infrastructure is overwhelmed. Learn how they can upgrade storage, enhance security, and democratize data access to drive better mission outcomes. Read the full research report.

  • Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.

  • The rise and rise of SD-WAN in post Covid-19

    Sponsored by: TechTarget ComputerWeekly.com

    So much has been up in the air in the wake of the onset of Covid-19 and the lockdowns and stay-at-home orders issued by various governments around the world. But there has been one thing that is pretty fixed: the rise and rise of software-defined wide area networks (SD-WANs).

  • How To Deploy A Password Policy

    Sponsored by: Specops Software

    This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.