Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"
-
Are You Realizing the Value of Hybrid Cloud?
Sponsored by: Ensono, LLCThis white paper explores the challenges of achieving hybrid cloud mastery and outlines six critical steps to overcome them. Inside, you'll learn how to optimize workloads, unlock data insights, and adopt a modernized operating model. Read the full white paper now to discover how to realize the full value of hybrid cloud.
-
Elevate your Security with Microsoft Defender for Business
Sponsored by: Arrow MSFTMicrosoft Defender for Business brings enterprise-grade security to SMBs with cross-platform protection, endpoint detection and response, and vulnerability management. Learn how this solution can help secure your organization's devices and data.
-
Data governance more important now than ever
Sponsored by: TechTarget ComputerWeekly.comAs organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
-
Scaling B2B Demand for Authentic Connections
Sponsored by: BrightTALK by TechTargetIn this eBook, learn how to effectively reach and convert targets at scale. Download your copy to explore new perspectives and methodologies on how to balance the crucial and competing needs for scale and depth of connections with your audience.
-
CIO Trends #9: Benelux
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.
-
Preventing identity theft in a data breach
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
Verizon ABM with Intent: Front Line Success at Scale
Sponsored by: TechTargetDive into this case study to examine how Verizon Business Group, a division within one of the world’s largest telecoms firms, for a strong example of how a team has implemented ABM concepts at scale to realize broad benefits across many business areas.
-
Computer Weekly - 10-16 September 2019: A tech boost for social care
Sponsored by: TechTarget ComputerWeekly.comIn this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
-
Pioneering Texas School District Improves Its Cybersecurity Posture with the Fortinet Security Fabric
Sponsored by: Fortinet, Inc.Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.
-
Essential Guide: How APAC firms can ride out the pandemic
Sponsored by: TechTarget ComputerWeekly.comIn this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, and how they have responded from a technology perspective by driving initiatives spanning digital transformation, business continuity, cloud, cyber security and remote working.