ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • Computer Weekly – 5 June 2018: The bumpy ride to digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the lessons to be learned from General Electric's bumpy ride to digital transformation. We assess the use of software-defined networking in corporate IT infrastructures. And we find out how Royal Bank of Scotland approaches digital and business innovation. Read the issue now.

  • Authentication After Passwords

    Sponsored by: Okta

    The future of authentication is loginless. Learn how passwordless and continuous authentication can enhance security, reduce friction, and build customer trust. Download the e-book to explore this transformative identity management approach.

  • The DevSecOps Playbook Practical Steps for Producing Secure Software

    Sponsored by: Veracode, Inc.

    What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.

  • The DevSecOps Playbook

    Sponsored by: Veracode

    This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

  • A Computer Weekly buyer's guide to modernising public sector IT

    Sponsored by: TechTarget ComputerWeekly.com

    Digitising the public sector is proving to be a long and winding road. In this 15-page buyer's guide, Computer Weekly looks at how some CIOs are embracing digital transformation, how coronavirus has accelerated it and why the UK government needs to embrace the challenge of digital collaboration

  • Survey Report: AI, Today

    Sponsored by: Dataiku

    As GenAI becomes a cornerstone of modern business, 90% of leaders are making substantial investments to harness its potential. Of those, 33% have created new budget lines specifically for GenAI, while 57% are using money from other budgets, such as IT, data science, or analytics. Access this research content now to learn more.

  • Annual Report On The State Of Application Security

    Sponsored by: Veracode

    In the current spectrum of cybersecurity, organizations are continuously trying to reduce their security debt, but what is just as important is to not introduce security flaws that can accumulate over the life of your applications, making them more vulnerable in the long run. Read on to learn more about the current state of application security.

  • Computer Weekly – 6 November 2018: After 10 years, Post Office IT system goes on trial

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, 10 years after we revealed concerns over the Post Office accounting system, affected subpostmasters finally get their day in court. We look at how businesses are turning to wearable tech to help employees. And we analyse the key players in the market for object storage. Read the issue now.

  • Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.

  • Sustainability at the Edge

    Sponsored by: Schneider Electric

    There is a yawning gap between enterprise perceptions and sustainability initiative realities. So how can your organization bridge the gap? Find out in this research report.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.