ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Top 10 cyber security stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.

  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

  • Top 10 ASEAN stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this review of the top Computer Weekly articles focused on IT in ASEAN, we look at Ascend Money's adoption of OpenShift, Go-Jek's experience with the cloud and Singapore's approach to the internet-of-things, among other developments.

  • Top 10 artificial intelligence stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    According to Gartner's 2019 CIO Agenda survey, organisations that have deployed artificial intelligence (AI) grew from 4% to 14% between 2018 and 2019. These are Computer Weekly's top 10 AI articles in 2019.

  • Hyperconverged Reference Architecture

    Sponsored by: Panduit

    In this e-book, explore Panduit’s proposals of foundational reference architecture utilizing a Dell Technologies configuration and validated Panduit physical infrastructure components.

  • A Computer Weekly buyer's guide to Colocation

    Sponsored by: TechTarget ComputerWeekly.com

    Colocation is an increasingly appealing option for data storage. In this 17-page buyer's guide, Computer Weekly looks at the constraints of migration, environmental considerations and datacentre opportunities in Africa.

  • 2024 Talkdesk global contact center KPI benchmarking report

    Sponsored by: Talkdesk

    Today’s organizations are constantly looking for new ways that they can enhance their contact center processes in order to make operations more efficient. To do so, many have turned to generative AI and other automation tools. However, does this technology actually live up to the hype? Dig into this report.

  • The Secure Coding Handbook

    Sponsored by: Veracode

    This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.

  • Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.

  • Pioneering Texas School District Improves Its Cybersecurity Posture with the Fortinet Security Fabric

    Sponsored by: Fortinet, Inc.

    Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.