Your Search returned 2342 results from our Editorial content

Sort By

SECURITY

Mingis on Tech: Blockchain explained

One of the buzziest topics in IT right now involves blockchain, the distributed ledger tech that underpins Bitcoin and cryptocurrency. But it can – and likely will...

SECURITY

Advice from a CISO: How to beat the fraudsters

Mike Turner, Chief Information Security Officer at Capgemini shares his perspective

   

CYBERCRIME

Everything you need to know about… Cybersecurity

IDG Connect's roundup of the most important industry insight and expertise on cybersecurity.

SECURITY

What will be the single biggest security threat of 2018?...

Our annual poll to find out what security professionals think the single biggest security threat of next year will be

   

SECURITY

5 ways users circumvent security measures and how to prevent...

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance...

SECURITY

Kwikset Obsidian touchscreen deadbolt review: Slim and sexy,...

As electronic lock manufacturers up their design game, Kwikset gets to work.

   

VIRTUALIZATION

Hypervisor control: The next phase in the security arms...

Hypervisor-based virtualised application protection tools enhance security, but there may be unintended consequences

SECURITY

What if we gave non-technical security issues vulnerability...

Which is worse: Pork Explosion and Dirty Cow or Invader and Stutter?

   

SECURITY

Buffered VPN review: It gets the job done

Respectable speeds and helpful tools make Buffered a solid choice for VPN users.

   
   
Previous 1 3 4 5 234 235

Your Search returned 779 results from our White Paper Library

Sort By
Meru Networks

WLAN

Security: Multiple Lines of Defense

To understand the unique vulnerabilities of wireless networks, it is necessary to analyze threats from the enterprise perspective. Wireless security vulnerabilities...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Oracle

Database Solutions

Preventing Enterprise Data Leaks

Discuss the growing internal threats to business information and know more about the impact of government regulations on the protection of data. Check...


Oracle

Budgeting, Planning & Forecasting

Protection against Internal and External Threats

Is your midsized organization facing insecurity for the sake of platform consistency? Stop! With the right multi-level data protection against a wide range...


Oracle

Regulatory Compliance

Make Compliance Work For You

Discover the five important steps to build embedded compliance architecture. Read on to learn how to deliver the best possible value for your IT budget...


Imperva

Security

SecureSphere Data Security Suite

This is the latest Technology Audit by Ovum Butler. View why Imperva's SecureSphere solution merits a closer evaluation by any organization keen on building...


Imperva

Security

State of Web Application Security

Ponemon Institute conducted this study to better understand the risk of insecure websites and how organizations’ are addressing internal and external threats.1...


Previous 1 3 4 5 77 78

Recommended for You

phil-muncaster

Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond

silhouette

Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?