Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"
-
MicroScope – March 2023: Steering the storage market
Sponsored by: MicroScopeIn this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.
-
Urban Myths About Secure Coding
Sponsored by: Veracode, Inc.Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.
-
Attacker Economics
Sponsored by: SailPoint TechnologiesThreat actors target privileged access to infiltrate systems, exfiltrate data, and disrupt operations. This infographic outlines the attacker economics behind these tactics and how an identity-first security strategy can improve cyber resilience. Read the full infographic to assess your identity security posture.
-
Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.
-
Webinar Series for ABM: An 8-Step Planning Framework
Sponsored by: BrightTALK by TechTargetAccount-based marketing (ABM) has become a popular strategy within the B2B tech space, especially as B2B marketers look to better align with the way Sales operates. Yet some argue that ABM program success has been mixed or even underwhelming at times. Access this e-book to learn more.
-
Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette
Sponsored by: CiscoThe 2024 "Cyber Threat Trends Report" by Cisco analyzes the threats crowding the cyber landscape, including information stealers, Trojans and ransomware. It also provides insights on how DNS security can help defend your organization against those growing threats. Read the 18-page report to unlock the full insights.
-
5 Pitfalls That Undermine Your AI Readiness - and How to Avoid Them
Sponsored by: QlikThis white paper explores the 5 pitfalls that can undermine your AI readiness and how to avoid them. Inside, you'll discover the critical steps to build a robust data foundation, define clear business objectives, and mitigate AI risks and ethics concerns. Read the white paper to ensure your AI initiatives deliver tangible value.
-
Top 10 datacentre stories of 2018
Sponsored by: TechTarget ComputerWeekly.comThere is nothing like a datacentre outage to highlight just how reliant the digital economy is on these facilities, with the 2018 news cycle dominated by tales of server rooms going awry and causing mass disruption to end users across the globe. Here's a look back over Computer Weekly's top 10 datacentre stories of 2018.
-
Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.
-
5 Critical Security Callouts to Know in 2024
Sponsored by: CiscoCisco conducted a survey and compiled the results in their 2024 Duo Trusted Access Report, which evaluates the new frontier for access management and identity security. Gain an understanding of the top 5 most important takeaways from the report in this infographic.