Your Search returned 14 results from our Editorial content

Sort By
  • Close-button

    Regulatory Compliance


How will China’s GDPR-like Cybersecurity Law impact business?...

China’s new Cybersecurity Law (CSL) may overlap with GDPR, but could still deliver the opposite effect from the intended one



Could GDPR become the new PPI?

Failure to comply with GDPR could see a wave of ‘no win, no fee’ compensation claims akin to the PPI scandal.


Everything you need to know about… GDPR

With less than a year to go, here is our roundup of the most important industry insight and expertise on GDPR.



US and China IP theft battle could hit Silicon Valley

Worrying times for Silicon Valley as US and China square off over IP theft


How to get to grips with the three pillars of compliance...

Dr. Jamie Graves, CEO of ZoneFox, looks at the thorny issue of compliance



Brexit means GDPR and unhindered data flows

Minister of State for Digital and Culture Matt Hancock reaffirms that Britain wants data flows, but little else.



A legal viewpoint on the tech supply chain scandals

Research shows tech companies need to press the reset button on human rights due diligence

Previous 1

Your Search returned 98 results from our White Paper Library

Sort By
  • Close-button

    Regulatory Compliance


Regulatory Compliance

Make Compliance Work For You

Discover the five important steps to build embedded compliance architecture. Read on to learn how to deliver the best possible value for your IT budget...

Symantec Corporation

Data Privacy and Security

Anatomy of a Data Breach

For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the...


Enterprise Application Integration (EAI)

Manage enterprise data with Integrated Data Management

To successfully harness organizational data to business goals and manage data and data-driven applications so they deliver business value, enterprises...


Regulatory Compliance

Foundations of GRC: Streamlining Compliance

Learn how to develop a streamlined compliance solution to maintain sustainability, consistency, efficiency, transparency and accountability.


Database Management

Forrester – Your Enterprise Database Security Strategy 2010...

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database...


Data Privacy and Security

Closing the Data Privacy Gap: Protecting Sensitive Data...

The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These...


Master Data Management

Data Growth Challenges Demand Proactive Data Management...

Most organizations do not have a firm handle on how to manage their data growth, particularly unstructured, file-based information – the fastest growing...


Data Privacy and Security

Forrester – Test Data Privacy is Critical to Meet Compliances...

Just because data is stored in a test or development environment does not release your firm from the responsibility to comply with privacy regulations....

EMC Corporation

Records Management

Managing Public Sector Records with Microsoft SharePoint...

Read this EMC overview to learn about an effective, joint records capture and management solution using EMC Captiva and Microsoft Sharepoint that helps...

Previous 1 3 4 5 9 10

Recommended for You


US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?