Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"
-
Are You Realizing the Value of Hybrid Cloud?
Sponsored by: Ensono, LLCThis white paper explores the challenges of achieving hybrid cloud mastery and outlines six critical steps to overcome them. Inside, you'll learn how to optimize workloads, unlock data insights, and adopt a modernized operating model. Read the full white paper now to discover how to realize the full value of hybrid cloud.
-
Choose The Right Path For Your Company’s Automation Journey
Sponsored by: Red HatIn the spirit of open, find in this e-book a compilation of success stories from Red Hat customers who use infrastructure automation to create repeatable instructions and processes that replace or reduce human interaction with IT systems.
-
Security 360: Annual Trends Report 2024
Sponsored by: JAMFJamf's annual security report analyzes the evolving threat landscape, evaluating device, application, malware, and web-based risks. It provides best practices to improve security posture, including managing vulnerabilities, implementing defense-in-depth, and aligning with compliance standards. Read the full report to secure your modern workplace.
-
CW ANZ – September 2018: Get to grips with DevOps
Sponsored by: TechTarget ComputerWeekly.comThe burgeoning DevOps culture in Australia has attracted new market players and led major companies to embrace the movement to get development and operations teams working in unison.
-
Manage and provision storage for DevOps
Sponsored by: TechTarget StorageToday's DevOps teams need to more easily manage and provision storage. Discover how application delivery processes have received a boost from the emergence of intelligent data storage and cloud storage.
-
Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.
-
A Computer Weekly buyer's guide to secure and agile app development
Sponsored by: TechTarget ComputerWeekly.comAs apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding
-
Pioneering Texas School District Improves Its Cybersecurity Posture with the Fortinet Security Fabric
Sponsored by: Fortinet, Inc.Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.
-
Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
-
CW ANZ, July 2020: Expert Advice on Security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.