ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Improving Endpoint Security and Signature-Based Detection

    Sponsored by: Sentinel Labs, Inc.

    Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.

  • CW APAC, July 2020: Trend Watch: Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.

  • CW APAC – Trend Watch: AI infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    Firms are starting to trust artificial intelligence in some of their most important processes. In this handbook, focused on AI infrastructure trends in the Asia-Pacific region, Computer Weekly looks at how it should be deployed, data and sustainability challenges and the advantages of large language models.

  • The components and objectives of privacy engineering

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.

  • Ransomware Defense And Remediation With Pure Storage

    Sponsored by: Pure Storage

    Download this ESG Technical Validation to explore a detailed evaluation of the Pure Storage solution for ransomware mitigation and recovery, and dive deep into how Pure Storage can work with your organization for comprehensive ransomware protection before, during, and after an attack.

  • Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting

    Sponsored by: Schneider Electric

    In this paper, explore the FAQs of Scope 3 emissions and discover the inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.

  • Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.

  • 3 Machine Learning Use Cases for Planning & Logistics

    Sponsored by: Alteryx

    Tired of relying on outdated forecasting methods and struggling to keep up with fluctuating customer demand? Download 3 Machine Learning Use Cases That Immediately Benefit Planning and Logistics Teams and start transforming your planning and logistics operations.

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    Sponsored by: TechTarget ComputerWeekly.com

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

  • Modernizing the Mainframe While Preserving IT Investments and Managing Risk

    Sponsored by: Ensono Limited

    Fragmented data, exceeded budget, data risk—these are 3 challenges common to mainframe modernization. To avoid these challenges and facilitate a smooth transformation, many organizations utilize a tool or service. One such service is Application Migration Methodology (AMM). Read this white paper to understand AMM’s 5 steps.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.