ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • A Computer Weekly E-Guide to Network Management & Monitoring

    Sponsored by: TechTarget ComputerWeekly.com

    Covid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.

  • Cybersecurity resilience in an era of identity sprawl

    Sponsored by: One Identity

    As a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.

  • Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.

  • A Computer Weekly eGuide to Workspaces

    Sponsored by: TechTarget ComputerWeekly.com

    In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.

  • Hybrid Cloud Backup

    Sponsored by: Veeam Software

    Tap into this Hybrid Cloud Backup for Dummies e-book to discover the importance of employing purpose-built backup and recovery for each of your environments, while retaining ownership of your data.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: TechTarget ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • How to Choose an HR Software System in 2021

    Sponsored by: IEX

    PH

  • The use of gene and cell therapy to advance medicine

    Sponsored by: XtelligentMedia Healthcare

    Cell and gene therapy is transforming medicine by offering potential cures for untreatable diseases, but navigating scientific and regulatory hurdles remains challenging.

  • Choosing the Best SASE Solution for Your Hybrid Workforce

    Sponsored by: Fortinet, Inc.

    With remote work here to stay, firms need flexible security for hybrid teams. Choose a single-vendor SASE for full protection, unified agent, secure access, SaaS security, variable pricing, cloud management, and hybrid deployment. For tips on picking and using the right SASE, see this white paper.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.