Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Kubernetes Backup, Dr, & App Mobility With Kasten K10
Sponsored by: Zadara StorageProtect Kubernetes data with an integrated, validated solution from Zadara and Kasten by Veeam. Secure your cloud-native applications with comprehensive backup, DR, and app mobility. Learn how this unified data management solution can simplify operations and reduce risk. Read the full overview.
-
Balancing Human And Digital: Are Banks Losing Touch With Customers?
Sponsored by: AvanadeToday, banks are challenged to balance human engagement and digital interactions – a high-wire act, Avanade explains in this research report. To find out why the pursuit is a challenging one, and to access guidance for approaching it, dive into the 18-page report.
-
CIO Trends #4: Middle East
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we look at some of the exciting technology developments being tested or already in use in the Middle East.
-
Enterprise 2030: Building The AI Powered Company Of The Future
Sponsored by: TeradataAccess this research report to learn why the most future-ready organizations will be the ones that make AI a competitive advantage, as well as 4 steps business leaders can take today to accelerate their transformations, starting with evaluating their data and AI maturity.
-
CW ASEAN – January 2019: Dive into microservices
Sponsored by: TechTarget ComputerWeekly.comIn this edition of CW ASEAN, we uncover the state of adoption of microservices in ASEAN and what needs to be in place for enterprises to get the most out of the technology.
-
How To Build, Scale & Evolve The Modern Data-Driven Demand Gen Engine
Sponsored by: TechTargetIn this e-book, explore the key considerations for how to begin, grow and continuously optimize a complete demand gen engine while staying responsive to changing business conditions as you go.
-
Top 10 cyber crime stories of 2019
Sponsored by: TechTarget ComputerWeekly.comOnce again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
-
Biometrics in the enterprise: An opportunity or an ethical minefield?
Sponsored by: TechTarget ComputerWeekly.comIs biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
-
Top 10 enterprise IT in the Middle East stories of 2019
Sponsored by: TechTarget ComputerWeekly.comCountries in the Middle East have become pioneers of the latest digital technologies and some of the articles featured by Computer Weekly this year evidence that. Here are Computer Weekly's top 10 enterprise IT in the Middle East stories of 2019.
-
Computer Weekly: Data Danger
Sponsored by: TechTarget ComputerWeekly.comIn this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?