Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"
-
Essential Guide: APAC women in cyber security
Sponsored by: TechTarget ComputerWeekly.comIn Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.
-
Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
Sponsored by: TechTarget ComputerWeekly.comThis undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
-
Government Intervention, The Rise Of The SBOM And The Evolution Of Software Supply Chain Security
Sponsored by: SonatypeHow are regulatory initiatives like the Biden administration’s “Securing Open Source Software Act” impacting software development and security? To find out, Censuswide surveyed 217 IT directors. Review the findings in this 9-page report by Sonatype.
-
Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
-
Computer Weekly – 14 November 2017: How fashion is turning to tech to get closer to customers
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine how the fashion world and clothing retailers are using technology to better understand customers. Brexit continues to dominate conversation in the UK tech sector – we find out the hopes and fears of the industry. And we look at how to use OpenStack in a hyper-converged infrastructure. Read the issue now.
-
Best Practices In Cloud Spend Management
Sponsored by: ServiceNowFinOps teams need to align tech efforts with budget limits. ServiceNow Cloud Cost Management offers a unified platform to monitor hybrid cloud expenses, budget effectively, optimize resources, and deactivate unused services. Discover how to enhance your cloud efficiency and expenditure by reading the full content.
-
Building a Cyberresilient Data Recovery Strategy
Sponsored by: Veeam SoftwareBuilding a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.
-
Top 10 datacentre stories of 2021
Sponsored by: TechTarget ComputerWeekly.comThe 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.
-
Building a Cybersecurity Strategy for the Digital Economy
Sponsored by: Schneider ElectricDownload this e-book for help establishing a pragmatic approach for creating a multi-layered cybersecurity strategy to help you reduce your business and digital risks.
-
Recruiting Benchmarks
Sponsored by: GEMExplore industry benchmarks for recruiting outreach, funnel conversion rates, and hiring trends across company size, role, industry, and demographics. Download this comprehensive report to gain insights and optimize your talent acquisition strategy.