ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Addressing Zero Trust for Government: The Role of Identity Security

    Sponsored by: Merlin International

    As governments adopt Zero Trust, identity security is critical. This white paper explores the role of identity security in a Zero Trust architecture, including five key principles and six focus areas to get started. Learn how the CyberArk Identity Security Platform can help you implement a successful Zero Trust strategy.

  • Computer Weekly – 6 August 2024: Migrating to S/4Hana – how the Co-op made its move

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's ezine, as SAP users prepare for the deadline to move off the ECC platform, we find out how Co-op is migrating to S/4Hana. Our latest buyer's guide looks at how to manage SaaS and on-premise software licensing. And we talk to former NCSC CEO Ciaran Martin about the true risks of nation-state cyber attacks. Read the issue now.

  • Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.

  • Computer Weekly - 6 July 2021: Where to start with Windows 11

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.

  • The Essential Guide to XDR

    Sponsored by: Palo Alto Networks

    Extended detection and response (XDR) is one of the main solutions cybersecurity professionals have turned to deal with the rise in cyberthreats. Read on for a comprehensive breakdown of XDR, what it is, how it works, and what you can do to get the most out of your XDR tools.

  • MicroScope – June 2020: The surge in home working

    Sponsored by: MicroScope

    The shift by many to home working has created opportunities and challenges for the channel as it looks to help customers through the changes. Also discover the importance of diversity in your workforce, and how Covid-19 is affecting IT events

  • Supercharging Employee Growth and Development

    Sponsored by: ServiceNow

    Business Leaders are finding that focusing on skills, rather than jobs or degrees, strengthens your workforce with modern data and insights. This paper presents four ways that a skills-powered approach can supercharge employee growth and development.

  • Computer Weekly - 2 March 2021: The most influential people in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal our annual list of the 50 most influential people in UK IT, and talk to this year's winner, NHS Digital CEO Sarah Wilkinson, about an unprecedented year of challenges. Also, we examine the best software patching strategies and see how the pandemic has affected women in tech. Read the issue now.

  • Trend Watch: CIO trends

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at predictions for 2023, how the Australian Red Cross managed a donation surge, Mondelez's digital transformation and Singapore's public sector IT strategy.

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.