ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Benelux Salary Survey 2016/2017

    Sponsored by: TechTarget ComputerWeekly.com

    he Computer Weekly 2016-2017 salary survey, which questioned 190 IT and business professionals in Benelux, found that, as expected, senior IT managers command the highest salaries, with an average annual income of €128,180.

  • MicroScope – May: Bundles deliver surprise package for SMEs

    Sponsored by: MicroScope

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

  • MicroScope – May 2018: Bundles deliver surprise package for SMEs

    Sponsored by: MicroScope

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

  • Computer Weekly – 2 October 2018: The most influential women in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology, and talk to this year's winner, Code First:Girls CEO Amali de Alwis, about the challenges of achieving diversity in IT. Also, our latest buyer's guide looks at the future of collaboration software. Read the issue now.

  • 5 Essential Steps to SOC Transformation

    Sponsored by: Palo Alto Networks

    Explore 5 essential steps to transform your security operations center (SOC) and elevate it with automation and AI capabilities designed for the modern threat landscape. Learn how to modernize your SOC to better detect, investigate, and respond to today's sophisticated cyberattacks. Read the full white paper.

  • Urban Myths About Secure Coding

    Sponsored by: Veracode, Inc.

    Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.

  • Computer Weekly – 25 October 2022: The Most Influential Women in UK Technology 2022

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal our annual list of the 50 Most Influential Women in UK Technology. We talk to the No.1 on the list, Flavilla Fongang, about how to improve diversity and inclusion in the sector. And we introduce our seven rising stars – the future female leaders of UK IT. Read the issue now.

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • Enterprise Buyer’s Guide for Secrets Detection

    Sponsored by: GitGuardian

    This buyer's guide outlines 10 key considerations for choosing a secrets detection platform to secure your software supply chain. Learn how to gain complete visibility, implement effective detection, streamline remediation, and empower developers. Read the full guide to strengthen your secrets security posture.

  • Using digital twins to cut costs and improve safety at Shell

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.