ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • Are You Realizing the Value of Hybrid Cloud?

    Sponsored by: Ensono, LLC

    This white paper explores the challenges of achieving hybrid cloud mastery and outlines six critical steps to overcome them. Inside, you'll learn how to optimize workloads, unlock data insights, and adopt a modernized operating model. Read the full white paper now to discover how to realize the full value of hybrid cloud.

  • Choose The Right Path For Your Company’s Automation Journey

    Sponsored by: Red Hat

    In the spirit of open, find in this e-book a compilation of success stories from Red Hat customers who use infrastructure automation to create repeatable instructions and processes that replace or reduce human interaction with IT systems.

  • Security 360: Annual Trends Report 2024

    Sponsored by: JAMF

    Jamf's annual security report analyzes the evolving threat landscape, evaluating device, application, malware, and web-based risks. It provides best practices to improve security posture, including managing vulnerabilities, implementing defense-in-depth, and aligning with compliance standards. Read the full report to secure your modern workplace.

  • CW ANZ – September 2018: Get to grips with DevOps

    Sponsored by: TechTarget ComputerWeekly.com

    The burgeoning DevOps culture in Australia has attracted new market players and led major companies to embrace the movement to get development and operations teams working in unison.

  • Manage and provision storage for DevOps

    Sponsored by: TechTarget Storage

    Today's DevOps teams need to more easily manage and provision storage. Discover how application delivery processes have received a boost from the emergence of intelligent data storage and cloud storage.

  • Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.

  • A Computer Weekly buyer's guide to secure and agile app development

    Sponsored by: TechTarget ComputerWeekly.com

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

  • Pioneering Texas School District Improves Its Cybersecurity Posture with the Fortinet Security Fabric

    Sponsored by: Fortinet, Inc.

    Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.

  • Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.

  • CW ANZ, July 2020: Expert Advice on Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.