ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Leveraging FinOps Whitepaper

    Sponsored by: Google

    In this white paper, discover how your organization can find the answers to these questions, highlighting how organizations are generating measurable business value - beyond cost savings - through their cloud transformation.

  • What to expect in the NSA's independent dispute resolution process

    Sponsored by: XtelligentMedia Healthcare

    The No Surprises Act's independent dispute resolution process provides a channel for payers and providers to negotiate payments without affecting patient spending.

  • AI proves value in HR, but handle with care

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, discover how the allocation of work by algorithm might have advantages for workers as well as employers, how AI is proving its value for HR and how data analytics is being used to support expansion and development.

  • Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.

  • Minimum Viable Governance

    Sponsored by: ModelOp

    Enterprises must implement AI governance programs to address risks and prepare for regulations like the EU AI Act. This white paper outlines a "Minimum Viable Governance" framework to inventory AI systems, enforce light controls, and report on AI usage and risks - without stifling innovation. Read the full white paper now to learn more.

  • Multi-pronged approach to cyber security professional development

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

  • Digital Experience Platforms Trends

    Sponsored by: Progress Software Corporation

    This e-book explores how organizations are leveraging digital experience platforms (DXPs) to drive digital transformation and customer experience. It covers the benefits of DXPs, such as increased agility and operational efficiencies, as well as the top technologies used to optimize digital experiences. Read the full e-book to learn more.

  • 2024 PKI and Post-Quantum Trends Study

    Sponsored by: Entrust, Inc.

    In this report, Ponemon Institute presents the findings based on a survey of 2,176 IT and IT security personnel who are involved in their organizations’ enterprise PKI, distilling the findings in order to provide you with essential guidance. Read now to learn more.

  • The DevSecOps Playbook Practical Steps for Producing Secure Software

    Sponsored by: Veracode, Inc.

    What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.

  • The DevSecOps Playbook

    Sponsored by: Veracode

    This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.