ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Computer Weekly – 2 July 2024: The most influential people in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 50 most influential people in UK technology for 2024, in our annual UKtech50 list. We talk to Post Office scandal campaigner Alan Bates, voted the most influential person in tech this year. Read the issue now.

  • The Essential Guide to XDR

    Sponsored by: Palo Alto Networks

    Extended detection and response (XDR) is one of the main solutions cybersecurity professionals have turned to deal with the rise in cyberthreats. Read on for a comprehensive breakdown of XDR, what it is, how it works, and what you can do to get the most out of your XDR tools.

  • The Public Sector’s Guide to Privilege

    Sponsored by: CyberFOX

    Cybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.

  • Computer Weekly – 24 September 2019: Climate change – the challenge for datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the impact of climate change on datacentres as potential victims and contributors to the problem. We look at the rise of voice channels and how IT leaders can use the technology for better customer experience. And we ask what lessons must be learned from Ecuador's citizens' data breach. Read the issue now.

  • CW Nordics May 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In a country like Sweden which has embraced IT to transform life and work and where concepts like cashless society are welcomed by many, the proliferation of artificial intelligence is inevitable.

  • The State of AI at Work

    Sponsored by: Asana

    The rapid rise of AI is transforming the workplace. This in-depth report examines the opportunities and challenges of AI adoption, from productivity gains to literacy gaps. Discover the 5 stages of AI maturity and how to harness AI's potential. Read the full report to learn how to move your organization to AI excellence.

  • EPM Managed Support Services

    Sponsored by: US Analytics

    Read this product overview to discern the flexible, economical options to administer and support your EPM applications available to you through US-Analytics’ managed support services.

  • How to get the best value from Office 365

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.

  • Top 10 IT careers and skills stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Digital skills are becoming increasingly important for day-today living, as well as for navigating the world of work. With digital and technology becoming a part of every company, it is important that all citizens in the UK have at least a basic level of digital competence. Here are Computer Weekly's top 10 IT careers and skills stories of 2019.

  • How To Modernize Your Data For A Resilient And Efficient Manufacturing System

    Sponsored by: T-Systems

    In this whitepaper, you’ll discover how advanced data management and data analysis technologies enable manufacturers to leverage their data treasures to increase the resilience of their manufacturing systems and supply chains and make them safe and secure for the future. Read on to learn how you can make the most of your manufacturing data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.