ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • CW Nordics - February-April 2021: Nordic startups aim to take the lead in pet tech advances

    Sponsored by: TechTarget ComputerWeekly.com

    Nordic technology startups are looking to take pet tech mainstream following the acceleration of the industry during the coronavirus pandemic.

  • 2024 Talkdesk global contact center KPI benchmarking report

    Sponsored by: Talkdesk

    Today’s organizations are constantly looking for new ways that they can enhance their contact center processes in order to make operations more efficient. To do so, many have turned to generative AI and other automation tools. However, does this technology actually live up to the hype? Dig into this report.

  • Elevate the Employee Experience with ESG

    Sponsored by: ServiceNow

    Environmental, social, and governance (ESG) mandates are top of mind for organizations everywhere. Explore this guide to 2023's top ESG opportunities, beginning with three ESG trends.

  • The Frightening Realities of Your SDR Program ... and What to Do About Them

    Sponsored by: TechTarget

    To compete for pipeline in their markets, companies have had to add more and more SDRs to their prospecting program. This e-book, The Frightening Realities of Your SDR Program ... and What to Do About Them, explores recent research that highlights key failures and how to go about solving them. Download your copy to get started.

  • CW EMEA - April 2023: Under attack and stressed out

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at how cyber attacks are taking a toll on security professionals, damaging their mental health and forcing some to quit. We also look at Finland's allure for tech entrepreneurs, how software is enabling a new business model for a Swedish car manufacturer, and the importance of backup testing. Read the issue now.

  • 2024 State of Application Security Report

    Sponsored by: CrowdStrike

    8 of the top 10 data breaches of 2023 were related to application attack surfaces. This report synthesizes data collected from a survey of application security professionals to reflect the current state of application security, condensing the findings into 8 key takeaways. Download now to learn more.

  • The generative AI advantage: A leader’s guide to using your data as a differentiator

    Sponsored by: AWS

    While general large language models can be used “out of the box” for some use cases, when you want to build generative AI applications that are unique to your business needs, your organization’s data is your strategic asset. Read on to uncover next steps for using data to create generative AI applications that know your customers deeply.

  • CW EMEA - May 2023: The future of work

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.

  • A Strategic Approach To Maintaining PCI DSS 4.0 Compliance

    Sponsored by: Cloudflare

    As PCI DSS 4.0 brings new compliance requirements, organizations need a streamlined approach to address them. This whitepaper outlines how Cloudflare's connectivity cloud can help you meet PCI DSS 4.0 with security, visibility, and automation. Read the full whitepaper to learn more.

  • ModelOps Explained: A Starter's Guide to Deploying and Managing AI and Analytical Models

    Sponsored by: SAS

    In this analyst report, discover the roadblocks your organisation may face when leveraging data for better business insights, and how to best use the data you collect when managing AI and analytical models.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.