ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • IT Priorities 2020: APAC

    Sponsored by: TechTarget ComputerWeekly.com

    The Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

  • SaaS Management A New Pillar Is Forged

    Sponsored by: JumpCloud

    As SaaS applications become essential for modern work, managing them is now a critical pillar of IT. This e-book explores how SaaS management can bring visibility, control, and cost optimization to your SaaS environment. Read on now to learn how to build a comprehensive SaaS management program.

  • CW Middle East ezine January 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Oil may be the main fuel to the economies of the Middle East, but the region is trying to break from its reliance on the black stuff. This ezine has already featured articles about the UAE and Saudi Arabia diversifying their economies, with particular interest in fintech.

  • Top 10 retail technology stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly looks at what 2019 had in store for the retail industry – what technologies were retailers rushing to adopt and how is customer behaviour changing?

  • Computer Weekly - 24 March 2020: Making home working work - a guide for IT leaders

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with staff working from home during the coronavirus crisis, we look at three key technology areas to consider. We find out about a novel approach to teaching security awareness to users. And we examine the role of IT in corporate environmental, social and governance programmes. Read the issue now.

  • The Devsecops Guide To Managing Open-Source Risk

    Sponsored by: Contrast Security

    As open-source software adoption grows, so do associated risks. This e-book examines how to establish visibility, manage policies, automate controls, and prioritize remediations to securely leverage open source without impacting DevOps. Read the full e-book to learn more.

  • Getting Started with Zero Trust Access Management

    Sponsored by: Okta

    For businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.

  • How to Develop Your EPM Strategy

    Sponsored by: US Analytics

    While developing an enterprise performance management (EPM) strategy seems straightforward enough, it’s critical to consider the many processes, people, and systems involved before choosing which path to take. Browse this guide to learn more.

  • European Perceptions, Preparedness and Strategies for IoT Security

    Sponsored by: TechTarget ComputerWeekly.com

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.