Your Search returned 269 results from our Editorial content

Sort By

NETWORKING & COMMUNICATIONS

NSA spying revelations have tired out China's Huawei

Revelations about U.S. secret surveillance programs have left China's Huawei Technologies exhausted on the public relations front, a top company executive said Wednesday....

SECURITY

Review: 1Password 4.5 brings a mature security app into...

In the past couple years, apps that store secure data on a Mac or iOS device have become a pretty common sight; the need for some kind of "secure vault" where you...

   

IT & SYSTEMS MANAGEMENT

How to keep your smartphone (and its data) secure

In our daily activities, our smartphones increasingly store or access sensitive business and personal data -- not just email, but also financial and medical information,...

SECURITY

Twitter app downloads could put users at risk

Twitter announced that it is putting its MoPub acquisition to use by enabling Twitter marketers to promote and distribute mobile apps. There is a potential opportunity...

   

SECURITY

33 great tips and tricks for iOS 7

Whether it's the first time you've picked up an iPad or the seventeenth time you've pulled out your iPhone today, there are probably still some iOS 7 features and...

SECURITY

Windows XP's retirement turns into major security project...

Microsoft may have retired Windows XP, but one of China's leading security vendors is trying to keep the OS threat-free, and rolling out protection software to hundreds...

   

SECURITY

Ukraine tensions could hurt international security efforts,...

International conflicts such as the current tensions over Ukraine could stand in the way of global cooperation on cybersecurity, according to the founder of Kaspersky...

SECURITY

Rushed Heartbleed fixes may expose users to new attacks...

In the race to protect themselves from the Heartbleed vulnerability, enterprises could be opening themselves up to new attacks if they aren't careful.

   

HUMAN RESOURCES

Guardian, Post win Pulitzers for NSA spying coverage

The Washington Post and the U.S. edition of the Guardian newspaper have each won a public service Pulitzer Prize for reporting on the leaks by Edward Snowden that...

SECURITY

In Heartbleed's wake, Comodo cranks out fresh SSL certificates...

Tens of thousands of new digital certificates have been issued by Comodo in the wake of the "Heartbleed" security flaw, which has put Internet users' data at risk....

   
   
Previous 1 3 4 5 26 27

Your Search returned 464 results from our White Paper Library

Sort By
Sophos

Security

Protecting Your Roaming Workforce With Cloud-Based Security...

This paper looks at the security challenges posed by remote employees, and how Cloud security can help.


IBM

Security

IBM X-Force 2013 Mid-Year Trend and Risk Report

Read this report for an in-depth analysis of the latest security threats and trends.


VeriSign

Security

Five Steps To Prepare For A DDoS Attack

This article provides five key DDoS mitigation steps enterprises can take now to prepare for a future attack.


Moka5

BYOD (Bring Your Own Device)

Nuts and Bolts: Planning and Implementing an Effective BYOD...

This paper offers best-practice guidance for maximizing your BYOD program while responding appropriately to its challenges.


Citrix

Mobile Working

From Wow to How: Mobilizing The Enterprise

Register now for this online event on 31st July 11AM (PT), where you will learn how to enable flexible workstyles – without compromising management, security,...


Clearswift

Security

The Need for Data Loss Prevention Now

This white paper provides an introduction to Data Loss Prevention Technology and how to best secure your data.


Moka5

Servers

Think Server-based VDI Keeps Your Data Secure? Think Again....

This white paper looks at the possible ways Virtualized desktops can be attacked and how to prevent data breaches.


OpenText

Networking & Communications

Communicating & Storing Sensitive Information

This video provides an overview of a new research report on the current state of data security in sectors where data protection is critical.


Clearswift

Security

10 Essential Steps to Email Security

This white paper from Clearswift provides a best practice guide on achieving better email security.


Clearswift

Security

10 Essential Steps to Web Security

This paper provides a ten-Point best practice guide to web security.


Previous 1 3 4 5 46 47

Most Recent Comments

IDG Connections

  • conect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • conect
  • conect
  • conect
  • conect
  • conect
no-image

Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/16/netapp
  • /view_company_report/506/qualys
  • /view_company_report/1304/ringcentral-inc
  • /view_company_report/1242/teradata

Poll

Is tech more of a problem or solution to climate change?