ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Zero Trust for the Workforce July 2024

    Sponsored by: Cloudflare

    Cloudflare commissioned Enterprise Strategy Group to survey 200 senior IT security decision-makers about their approach to securing user access to corporate apps and resources, across traditional, digital-native, and public-sector organizations. Download the eBook to see the consensus about Zero Trust for the workforce.

  • Considerations for Implementing Zero Trust for the Workforce

    Sponsored by: Cloudflare

    As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.

  • Top 10 cloud stories 2018

    Sponsored by: TechTarget ComputerWeekly.com

    While cloud has established itself as the preferred way for many enterprises to consume IT resources, organisations in some vertical markets have taken markedly longer to come round to its charms. With this as a backdrop, Computer Weekly takes a look at the top 10 cloud stories of 2018.

  • Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.

  • Multi-pronged approach to cyber security professional development

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

  • The Essential Guide To Growing Your Business With Managed Power Services

    Sponsored by: Schneider Electric

    This eBook from Schneider Electric guides IT solution providers on adding managed power services to increase revenue. Learn how to leverage software tools for remote monitoring and management of critical infrastructure. Read now to future-proof your business.

  • Digital transformation: bridging the paper and digital gap

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprises are increasingly turning to traditional managed print service providers to improve process efficiency across both paper and digital information, says this report from analyst group, Quocirca.

  • How University Of Michigan Health-West Improved Clinician Wellbeing

    Sponsored by: Microsoft and Nuance

    Facing burnout, University of Michigan Health-West clinicians used Nuance's Dragon Ambient eXperience to convert conversations into notes, boosting satisfaction and productivity. High users saw 12 extra patients and 20 more wRVUs monthly, with revenue yielding an 80% ROI. Discover how voice tech enhanced clinician experience.

  • CW EMEA - September 2023: The value of valuing people

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA ezine, we look at HR software and strategies that can help combat staff attrition and find out how Finland's and Sweden's plans to join NATO have initiated activity in the Nordic cyber security sector already. Read the issue now.

  • Government Intervention, The Rise Of The SBOM And The Evolution Of Software Supply Chain Security

    Sponsored by: Sonatype

    How are regulatory initiatives like the Biden administration’s “Securing Open Source Software Act” impacting software development and security? To find out, Censuswide surveyed 217 IT directors. Review the findings in this 9-page report by Sonatype.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.