Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"
-
Jargon Buster Guide to Post Quantum Cryptography
Sponsored by: TechTarget ComputerWeekly.comThis Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
-
Computer Weekly – Dell Technologies aims for an intelligent, connected future
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.
-
Mastering Recruitment Metrics An In-Depth Guide
Sponsored by: GEMDiscover how to leverage recruitment metrics to transform recruiters into talent acquisition authorities, debug hiring funnels, forecast progress, and demonstrate recruiting's impact on the business. Download the in-depth guide to learn more.
-
Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
Untethered: How CIOs & CISOs Are Paving the Way for the New Hybrid Workforce
Sponsored by: ZscalerThis in-depth research report examines how CIOs and CISOs are overcoming the challenges of the hybrid workforce, including securing remote access and more. Download the full report to discover effective techniques for transitioning to a Zero Trust strategy.
-
19 machine learning interview questions and answers
Sponsored by: TechTarget ComputerWeekly.comAspiring machine learning job candidates should be fluent in varied aspects of machine learning, from statistical theory and programming concepts to general industry knowledge. Read our list of commonly asked machine learning questions and accompanying answers to help you prepare for your interview.
-
The future of enterprise IT: Social, social, mobile, analytics and cloud
Sponsored by: TechTarget ComputerWeekly.comCloud and data technologies are allowing organizations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organizations in South-East Asia.
-
CW Middle East - January-March 2021: $60m venture capital fund targets 120 startups
Sponsored by: TechTarget ComputerWeekly.comCountries in the Middle East see technology as an industry of the future and are investing heavily in the sector as part of their economic diversification plans. Read in this issue how the latest development will see a $60m venture capital fund, based in Bahrain, invest in 120 early-stage startups across the Middle East region.