Your Search returned 2281 results from our Editorial content

Sort By

SECURITY

Operation Cloud Hopper shows we can’t rely on anti-virus...

Greg Sim, CEO of Glasswall Solution, explains why businesses must scan email attachments to catch ATP10 malware

   

SECURITY

How to overcome the challenges of Microsoft’s Security Bulletin...

Ken Hilker from Flexera Software discusses how IT professionals can best cope with the retirement of Security Bulletins

   

SECURITY

Five reasons the wrong CISOs get hired

Why do the wrong people keep getting hired as CISOs?

SECURITY

How and why to hire a CISO

If you haven't yet hired a chief information security officer, you're not alone. Here are the considerations for creating the position and making the hire.

   

SECURITY

Google uses machine learning for new security features in...

Google has pushed four new security features to enterprise users on G Suite, the search giant's hosted business offering. The new protections come shortly after...

SECURITY

Boardrooms have finally started giving encryption the attention...

Thales’ latest encryption trends report shows business leaders are finally taking note

   

SECURITY

Five tips to keep your business safe from the next global...

Pete Turner from Avast shares his tips on how to stay secure

SECURITY

Instant Messaging: A threat hiding in plain sight

Thomas Fischer discusses the security implications of IM

   
   
Previous 1 3 4 5 228 229

Your Search returned 626 results from our White Paper Library

Sort By
Meru Networks

WLAN

Security: Multiple Lines of Defense

To understand the unique vulnerabilities of wireless networks, it is necessary to analyze threats from the enterprise perspective. Wireless security vulnerabilities...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Oracle

Database Solutions

Preventing Enterprise Data Leaks

Discuss the growing internal threats to business information and know more about the impact of government regulations on the protection of data. Check...


Oracle

Budgeting, Planning & Forecasting

Protection against Internal and External Threats

Is your midsized organization facing insecurity for the sake of platform consistency? Stop! With the right multi-level data protection against a wide range...


Oracle

Regulatory Compliance

Make Compliance Work For You

Discover the five important steps to build embedded compliance architecture. Read on to learn how to deliver the best possible value for your IT budget...


Imperva

Security

SecureSphere Data Security Suite

This is the latest Technology Audit by Ovum Butler. View why Imperva's SecureSphere solution merits a closer evaluation by any organization keen on building...


Imperva

Security

State of Web Application Security

Ponemon Institute conducted this study to better understand the risk of insecure websites and how organizations’ are addressing internal and external threats.1...


Previous 1 3 4 5 62 63

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?