ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Software Security is a Team Sport

    Sponsored by: Veracode

    Software security requires collaboration across security, development, and operations teams. Learn best practices for integrating security into the software development lifecycle, measuring success, and becoming an elite organization. Read the full white paper to discover how to build a culture of security.

  • Software Security is a Team Sport Become an Elite Organization with Secure Cloud Development Collaboration

    Sponsored by: Veracode, Inc.

    In this 18-page e-book, learn why secure software development is a team sport, how to integrate security into development in 6 steps, and more.

  • How do cybercriminals steal credit card information?

    Sponsored by: TechTarget ComputerWeekly.com

    Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.

  • Measuring the ROI of SOAR

    Sponsored by: Splunk

    Investing in a security orchestration, automation, and response (SOAR) solution can be one of the most important decisions you make for your SOC. But just how much of a difference can it make? Get your copy of Measuring the ROI of SOAR to discover how SOAR solutions can provide a significant return on investment (ROI) for your team.

  • As-A-Service IT: Maximizing Your Return, Wherever You Are On Your Modernization Journey

    Sponsored by: Pure Storage

    In this ESG white paper, discover the secrets to maximizing your return when evaluating as-a-service consumption and agile infrastructure options for on-premises IT.

  • CW Middle East July to Sept 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.

  • CW APAC, April 2022: Trend Watch: Cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • Powerful DDoS Attacks & Recovery for Enterprises

    Sponsored by: Arbor Networks

    A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.

  • What CEOs Need to Know in 2024

    Sponsored by: The Advisory Board

    Americans are seeing worsening health outcomes, higher overall health spending, declining patient satisfaction, and burnt-out clinicians. This report will explain these recently accelerating shifts and empower executives to make strategic bets about their businesses today that set them up for long-term success. Download your copy to learn more.

  • 12 top enterprise risk management trends in 2023

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.