Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"
-
Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
-
The Secure Coding Handbook
Sponsored by: VeracodeThis 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
-
CW Nordics November 2016
Sponsored by: TechTarget ComputerWeekly.comThis quarter, we look at the impact of Nokia layoffs on Finland, and in particular the city of Espoo which is home to both Nokia and Microsoft's Finnish headquarters. We also look at how Denmark's Bang & Olufsen is taking control of sales data with cloud-based software.
-
State of Application Security 2024
Sponsored by: CloudflareToday’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.
-
CW Nordics May 2017
Sponsored by: TechTarget ComputerWeekly.comThe cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.
-
IAM: Managing identity remains key to cyber security
Sponsored by: TechTarget ComputerWeekly.comIT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
The Modern IT Professional’s Guide To Shadow IT
Sponsored by: Auvik Networks, Inc.Unapproved tools put organizations at risk. Learn how to govern, identify, protect, detect, respond, and recover from shadow IT. Read this white paper for a comprehensive plan to shed light on the shadows – also inside, find a self-assessment quiz that helps you determine your risk factor.
-
Escaping legacy – removing a major roadblock to a digital future
Sponsored by: TechTarget ComputerWeekly.comCore legacy systems inhibit businesses' ability to meet changing customer demands in the digital age. The scale and nature of the problem is such that it needs to be addressed now.
-
CW Nordics - November 2020-January 2021: Bank branch closures continue as digital banking grows
Sponsored by: TechTarget ComputerWeekly.comSweden's Handelsbanken is cutting its branch network by nearly half, which means more money will be invested in IT. But it's not just Sweden and the Nordics – banks across the world are watching the fintech industry demonstrate to consumers what banking can be like if the right technology is in place.
-
CW Innovation Awards: NUHS taps RPA in Covid-19 swab tests
Sponsored by: TechTarget ComputerWeekly.comIn this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.