Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
A Computer Weekly E-Guide to Network Management & Monitoring
Sponsored by: TechTarget ComputerWeekly.comCovid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.
-
Cybersecurity resilience in an era of identity sprawl
Sponsored by: One IdentityAs a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.
-
Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.
-
A Computer Weekly eGuide to Workspaces
Sponsored by: TechTarget ComputerWeekly.comIn this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.
-
Hybrid Cloud Backup
Sponsored by: Veeam SoftwareTap into this Hybrid Cloud Backup for Dummies e-book to discover the importance of employing purpose-built backup and recovery for each of your environments, while retaining ownership of your data.
-
A Computer Weekly buyer's guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
How to Choose an HR Software System in 2021
Sponsored by: IEXPH
-
The use of gene and cell therapy to advance medicine
Sponsored by: XtelligentMedia HealthcareCell and gene therapy is transforming medicine by offering potential cures for untreatable diseases, but navigating scientific and regulatory hurdles remains challenging.
-
Choosing the Best SASE Solution for Your Hybrid Workforce
Sponsored by: Fortinet, Inc.With remote work here to stay, firms need flexible security for hybrid teams. Choose a single-vendor SASE for full protection, unified agent, secure access, SaaS security, variable pricing, cloud management, and hybrid deployment. For tips on picking and using the right SASE, see this white paper.
-
Security analytics: Enabling organisations to get ahead of attackers
Sponsored by: TechTarget ComputerWeekly.comIn the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.