ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • Essential Guide: APAC women in cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.

  • Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated

    Sponsored by: TechTarget ComputerWeekly.com

    This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.

  • Government Intervention, The Rise Of The SBOM And The Evolution Of Software Supply Chain Security

    Sponsored by: Sonatype

    How are regulatory initiatives like the Biden administration’s “Securing Open Source Software Act” impacting software development and security? To find out, Censuswide surveyed 217 IT directors. Review the findings in this 9-page report by Sonatype.

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

  • Computer Weekly – 14 November 2017: How fashion is turning to tech to get closer to customers

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how the fashion world and clothing retailers are using technology to better understand customers. Brexit continues to dominate conversation in the UK tech sector – we find out the hopes and fears of the industry. And we look at how to use OpenStack in a hyper-converged infrastructure. Read the issue now.

  • Best Practices In Cloud Spend Management

    Sponsored by: ServiceNow

    FinOps teams need to align tech efforts with budget limits. ServiceNow Cloud Cost Management offers a unified platform to monitor hybrid cloud expenses, budget effectively, optimize resources, and deactivate unused services. Discover how to enhance your cloud efficiency and expenditure by reading the full content.

  • Building a Cyberresilient Data Recovery Strategy

    Sponsored by: Veeam Software

    Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.

  • Top 10 datacentre stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    The 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.

  • Building a Cybersecurity Strategy for the Digital Economy

    Sponsored by: Schneider Electric

    Download this e-book for help establishing a pragmatic approach for creating a multi-layered cybersecurity strategy to help you reduce your business and digital risks.

  • Recruiting Benchmarks

    Sponsored by: GEM

    Explore industry benchmarks for recruiting outreach, funnel conversion rates, and hiring trends across company size, role, industry, and demographics. Download this comprehensive report to gain insights and optimize your talent acquisition strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.