ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Trust no one: Why zero trust security is taking the world by storm

    Sponsored by: TechTarget ComputerWeekly.com

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

  • A guide to platform agnostic application delivery

    Sponsored by: TechTarget ComputerWeekly.com

    There is no single answer to the question of how to run applications independent of the underlying hardware. In this e-guide, we explore options for application virtualisation.

  • CW Nordics August 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.

  • Protect Passwords, Don’t Just Manage Them

    Sponsored by: CyberArk

    When 921 password attacks occur per second, it’s time to treat everyday employees’ credentials like the true operational risk they are. In this whitepaper, CyberArk Chief Information Officer Omer Grossman provides a CIO’s perspective on password-related risks keeping security leaders up at night.

  • 2024 Workplace Experience Trends & Insights Report

    Sponsored by: Appspace

    What do employees today want from their workplace experience? What’s working? What’s not? And what can you do about it? You don’t have to guess – because the 2024 Workplace experience trends & insights report from Appspace is here. Access this report to learn more.

  • Full visibility and real-time threat response: Helping retailers achieve proactive IT Security

    Sponsored by: Tanium

    Hackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.

  • CW Nordics November 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.

  • 2018/19 Salary Survey Results - UKI

    Sponsored by: TechTarget ComputerWeekly.com

    In the results of Computer Weekly's 2018 Salary Survey, we get a snapshot of what IT professionals in the UK and Ireland are getting paid, as well as their attitudes towards work, training and future prospects.

  • CW Nordics November 2016

    Sponsored by: TechTarget ComputerWeekly.com

    This quarter, we look at the impact of Nokia layoffs on Finland, and in particular the city of Espoo which is home to both Nokia and Microsoft's Finnish headquarters. We also look at how Denmark's Bang & Olufsen is taking control of sales data with cloud-based software.

  • Digital Disruption Index – from experimentation to transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations are investing in digital technologies, including artificial intelligence, blockchain and augmented reality, but executives fear they lack skills to implement a digital strategy, Deloitte's Digital Disruption Index reveals.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.