Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Computer Weekly - 12 April 2022: Disney combines digital, data and creativity for ad opportunities
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.
-
Business transformation through application modernization in the cloud
Sponsored by: AWSDiscover how digital modernization can transform your business through cloud-based application and IT modernization. Learn how to migrate and modernize seamlessly to drive innovation and meet customer demands. Read the full white paper to learn more.
-
Focus: Securing for the future
Sponsored by: TechTarget ComputerWeekly.com2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
-
Clouds in the desert as Middle East transforms
Sponsored by: TechTarget ComputerWeekly.comCloud computing is driving digital transformation across the Middle East, with the take-up of on-demand computing resources surging. Read in this e-guide why technology suppliers are building cloud infrastructures across the region and why businesses crave them.
-
Privileged Access Management Maturity in the Cloud Era
Sponsored by: SaviyntIt’s estimated that 80% of data breaches involve privilege misuse or compromise. Gartner lists Privileged Access Management (PAM) as a critical infrastructure service and a high-priority cyber defense capability. Read this white paper to learn more.
-
Computer Weekly – 15 October 2019: Securing the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
-
5 Steps to Better Data Quality for Generative AI and Beyond
Sponsored by: DataikuData quality is critical for successful Generative AI, but many organizations struggle with it. This white paper outlines 5 steps to improve data quality, including democratizing data quality efforts and embedding quality checks across operations. Read the full white paper to gain a competitive advantage through better data quality.
-
CrowdStrike outage explained: What happened and what can we learn?
Sponsored by: TechTarget ComputerWeekly.comA botched content update released by CrowdStrike in July 2024 led to a massive IT outage affecting about 8.5 million Windows systems worldwide. In this e-guide, learn more about how the outage occurred, its impact on organisations around the globe, and what you can do to mitigate the risks of similar incidents in future.
-
Identity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comIdentity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
-
Getting Cloud Security Right
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.