ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Computer Weekly - 12 April 2022: Disney combines digital, data and creativity for ad opportunities

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.

  • Business transformation through application modernization in the cloud

    Sponsored by: AWS

    Discover how digital modernization can transform your business through cloud-based application and IT modernization. Learn how to migrate and modernize seamlessly to drive innovation and meet customer demands. Read the full white paper to learn more.

  • Focus: Securing for the future

    Sponsored by: TechTarget ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Clouds in the desert as Middle East transforms

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud computing is driving digital transformation across the Middle East, with the take-up of on-demand computing resources surging. Read in this e-guide why technology suppliers are building cloud infrastructures across the region and why businesses crave them.

  • Privileged Access Management Maturity in the Cloud Era

    Sponsored by: Saviynt

    It’s estimated that 80% of data breaches involve privilege misuse or compromise. Gartner lists Privileged Access Management (PAM) as a critical infrastructure service and a high-priority cyber defense capability. Read this white paper to learn more.

  • Computer Weekly – 15 October 2019: Securing the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

  • 5 Steps to Better Data Quality for Generative AI and Beyond

    Sponsored by: Dataiku

    Data quality is critical for successful Generative AI, but many organizations struggle with it. This white paper outlines 5 steps to improve data quality, including democratizing data quality efforts and embedding quality checks across operations. Read the full white paper to gain a competitive advantage through better data quality.

  • CrowdStrike outage explained: What happened and what can we learn?

    Sponsored by: TechTarget ComputerWeekly.com

    A botched content update released by CrowdStrike in July 2024 led to a massive IT outage affecting about 8.5 million Windows systems worldwide. In this e-guide, learn more about how the outage occurred, its impact on organisations around the globe, and what you can do to mitigate the risks of similar incidents in future.

  • Identity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

  • Getting Cloud Security Right

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.