Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Improving Endpoint Security and Signature-Based Detection
Sponsored by: Sentinel Labs, Inc.Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.
-
CW APAC, July 2020: Trend Watch: Security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
-
CW APAC – Trend Watch: AI infrastructure
Sponsored by: TechTarget ComputerWeekly.comFirms are starting to trust artificial intelligence in some of their most important processes. In this handbook, focused on AI infrastructure trends in the Asia-Pacific region, Computer Weekly looks at how it should be deployed, data and sustainability challenges and the advantages of large language models.
-
The components and objectives of privacy engineering
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
-
Ransomware Defense And Remediation With Pure Storage
Sponsored by: Pure StorageDownload this ESG Technical Validation to explore a detailed evaluation of the Pure Storage solution for ransomware mitigation and recovery, and dive deep into how Pure Storage can work with your organization for comprehensive ransomware protection before, during, and after an attack.
-
Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
Sponsored by: Schneider ElectricIn this paper, explore the FAQs of Scope 3 emissions and discover the inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
-
Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.
-
3 Machine Learning Use Cases for Planning & Logistics
Sponsored by: AlteryxTired of relying on outdated forecasting methods and struggling to keep up with fluctuating customer demand? Download 3 Machine Learning Use Cases That Immediately Benefit Planning and Logistics Teams and start transforming your planning and logistics operations.
-
CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal
Sponsored by: TechTarget ComputerWeekly.comThere is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.
-
Modernizing the Mainframe While Preserving IT Investments and Managing Risk
Sponsored by: Ensono LimitedFragmented data, exceeded budget, data risk—these are 3 challenges common to mainframe modernization. To avoid these challenges and facilitate a smooth transformation, many organizations utilize a tool or service. One such service is Application Migration Methodology (AMM). Read this white paper to understand AMM’s 5 steps.