REGULATORY COMPLIANCE

Everything you need to know about… GDPR

With less than a year to go, here is our roundup of the most important industry insight and expertise on GDPR.

HUMAN RESOURCES

Millennials talk careers: Ari Ratnakumar

Do the stereotypes about Millennials stack up?

INTERNET

News Roundup: Tech CEO’s ditch the White House post-Charlottesville

A roundup of the week’s technology news including Facebook clones, robot fails, and Amazon drone trains.

ENTERPRISE DATA PROTECTION

Stop angry ex-employees from stealing your data

As more businesses move to the cloud many leave themselves exposed to disgruntled ex-employees

SOFTWARE

C-suite talk fav tech: David Williamson, EfficientIP

What tech do the c-suite really get excited about?

REGULATORY COMPLIANCE

US and China IP theft battle could hit Silicon Valley

Worrying times for Silicon Valley as US and China square off over IP theft

BUSINESS INTELLIGENCE SOFTWARE

IBM QRadar vs. Splunk: Which analytics platform is best for you?

This IT Central Station report compares real users’ feedback on IBM QRadar and Splunk

BUSINESS MANAGEMENT

Introducing the Chief Disruption Officer

Andrew Brinded from Nutanix discusses the latest newcomer to the corporate boardroom

INTERNET SECURITY

Why DomainTools swapped selling '.coms' for hunting criminals

DomainTools’ Tim Helming talks about how the company pivoted to focus on security.

HUMAN RESOURCES

Is bullying a big problem in IT?

Workplace bullying is a problem everywhere but could things be worse in IT?

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?