Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Multi-Factor Authentication Deployment Guide
Sponsored by: OktaThreat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.
-
A Computer Weekly Buyer's Guide to Datacentre Management
Sponsored by: TechTarget ComputerWeekly.comOnly 31% of IT decision-makers surveyed said that they had a repeatable, optimised or managed strategy in place. Take a look at this vendor-neutral buyer's guide to see how the experts are predicting cloud computing will impact your data center in the next 3 years.
-
The Hidden Risks of Third-Party Access
Sponsored by: SaviyntHow many vendors have the key to your kingdom? The sheer volume of access requests has overwhelmed Identity and Access Management (IAM) teams and made third-party access a prime attack vector. Read this eBook to learn more.
-
Computer Weekly – 15 October 2024: A future of virtual collaboration
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine how immersive technologies such as augmented and virtual reality are set to transform workplace collaboration. We look at how AI is helping to deliver improvements in customer experience. And we analyse the problems in the Post Office project to replace its troubled Horizon IT system. Read the issue now.
-
RSA Conference 2020 guide: Highlighting security's human element
Sponsored by: TechTarget ComputerWeekly.comThe theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
-
CW Middle East – January 2017
Sponsored by: TechTarget ComputerWeekly.comIn this quarter's CW Middle East ezine, we look at how the Middle East, with the poorest road safety record in the world, could benefit most from self-driving cars.
-
Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.
-
Jargon Buster Guide to Voice over IP (VoIP)
Sponsored by: TechTarget ComputerWeekly.comIn this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
-
A Computer Weekly Buyer's Guide to Internet of Things Security
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
-
Best practices for remote data backups
Sponsored by: TechTarget ComputerWeekly.comThis guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.