Your Search returned 2215 results from our Editorial content

Sort By

SECURITY

Network management vulnerability exposes cable modems to...

Hundreds of thousands of internet gateway devices from around the world, primarily cable modems, are vulnerable to hacking because of a serious weakness in their...

SECURITY

Cloudflare wants to secure IoT connections to the internet...

Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to protect devices from attacks and deploy patches much quicker....

   

SECURITY

U.S. military wants white-hat hackers to target its cyber...

The U.S. Air Force is seeking vetted hackers to probe its public Web sites while a top Pentagon official is considering a similar program to test sensor networks...

SECURITY

Next-gen IoT botnet Hajime nearly 300K strong

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated some high-profile websites...

   

SECURITY

Cyberespionage, ransomware big gainers in new Verizon breach...

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016. Cyberspionage accounted for 21 percent...

SECURITY

Ransomware attacks are taking a greater toll on victim's...

The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, up from $294 the...

   

SECURITY

Companion mobile app exposed Hyundai cars to potential hijacking...

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock and start vehicles....

SECURITY

Cyber infrastructure: Too big to fail, and failing

Just about everybody – from enterprises to individuals – depend on cyber protection. They aren’t getting that much, according to the Atlantic Council’s Joshua Corman....

   

SECURITY

Russian hackers use OAuth, fake Google apps to phish users...

The Russian hacking group blamed for targeting U.S. and European elections has been tricking victims into handing over login credentials with fake Google security...

SECURITY

Old Windows Server machines can still fend off hacks. Here's...

Keeping a computer up-to-date, with the latest OS and software patch, is one of the best things you can do to stay safe from cyber threats.

   
   
Previous 1 3 4 5 221 222

Your Search returned 578 results from our White Paper Library

Sort By
Meru Networks

WLAN

Security: Multiple Lines of Defense

To understand the unique vulnerabilities of wireless networks, it is necessary to analyze threats from the enterprise perspective. Wireless security vulnerabilities...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Oracle

Database Solutions

Preventing Enterprise Data Leaks

Discuss the growing internal threats to business information and know more about the impact of government regulations on the protection of data. Check...


Oracle

Budgeting, Planning & Forecasting

Protection against Internal and External Threats

Is your midsized organization facing insecurity for the sake of platform consistency? Stop! With the right multi-level data protection against a wide range...


Oracle

Regulatory Compliance

Make Compliance Work For You

Discover the five important steps to build embedded compliance architecture. Read on to learn how to deliver the best possible value for your IT budget...


Imperva

Security

SecureSphere Data Security Suite

This is the latest Technology Audit by Ovum Butler. View why Imperva's SecureSphere solution merits a closer evaluation by any organization keen on building...


Imperva

Security

State of Web Application Security

Ponemon Institute conducted this study to better understand the risk of insecure websites and how organizations’ are addressing internal and external threats.1...


Previous 1 3 4 5 57 58

Blogs

dan2

Doubting Disruption

Can we stop with all the Snapchat clones?

Dan Swinhoe casts a critical eye on the future

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should we donate our health data the same way we donate organs?