Search Results for: Office

Royal Holloway: Information security of the 2016 Philippine automated elections
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.

TechTarget ComputerWeekly.com

Critical Power and IT Data continuity for Healthcare
Discover in this product overview how Schneider Electric can help you navigate the power and digital solutions landscape to prepare your organization for a future of safe, efficient, and patient-centered healthcare.

TOPICS: .NET
Schneider Electric

Mobile Payments Using Host Card Emulation with NFC
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.

TechTarget ComputerWeekly.com

Cloud Market Report Australia
What is the state of Australia's cloud market? Inside this market report, industry experts share their thoughts on how the key players measure up and find out how Bendigo Bank, Frisk, Pizza Hut, RMIT Online, Unit4 are maximising their cloud investments.

TechTarget ComputerWeekly.com

The 5G for Business Guidebook
Besides being able to download Netflix movies faster, should you really care about 5G? Download this e-guide to learn about the basics of 5G, how it differs from 4G, why you should care and how to find the best 5G fit for your organization.

Cradlepoint

Harnessing data to innovate and scale
In today's data-driven world, startups that embrace a comprehensive data strategy gain a significant competitive advantage. Discover how leading startups are leveraging the power of data on AWS to accelerate innovation, foster efficiency, and make smarter decisions faster.

AWS

A Guide To An Effective Code And Software Signing Policy
Code signing is a critical step in the process of building and protecting software. This guide is designed to help you formulate a strategy that combines software, process, and policy to achieve end-to-end security in your signing practices. Read now to learn more.

TOPICS: .NET
DigiCert

The B2B Technology Buyer’s Journey for Joint Solutions Insights for Partner Marketers
77% of B2B technology professionals surveyed by Enterprise Strategy Group (ESG) plan to increase their budget for joint partner solutions in the next 12 to 24 months. To discover why this is the case, and to unlock insights about the buying journey, tap into this TechTarget e-book.

TOPICS: .NET
TechTarget

DEVSECOPS BUYER’S GUIDE: APPLICATION SECURITY
Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.

TOPICS: .NET
Contrast Security

The Big Book of Enterprise 5G
Why should you care about 5G? Along with answering that question, this ultimate guide to enterprise 5G provides a comprehensive overview of the subject. Read on to unlock guidance that can help your organization harness 5G’s power.

TOPICS: .NET
Cradlepoint