Your Search returned 2388 results from our Editorial content

Sort By


Microsoft strikes security pact with long-time rival BlackBerry...

Microsoft has announced a strategic partnership with BlackBerry, with the one-time Redmond rival set to provide security integration with Office applications.


AMD confirms Ryzenfall vulnerabilities, but says they'll...

AMD has issued its response to the Ryzenfall vulnerabilities discovered by CTS-Labs, and it sounds like they can be patched rather routinely.



Facebook security chief Alex Stamos reportedly planning...

Amid the mounting crisis from the Facebook/Cambridge scandal, sources say Facebook's security chief is planning to leave the company after disagreements about how...


F-Secure Safe review: A solid antivirus suite that gets...

F-Secure Safe is great at detecting malicious threats, it doesn't bother you with constant pop-ups, but it would be better if more devices were covered at the $100...



AMD's Ryzen, Epyc security co-processor and chipset have...

A little-known security firm claims that AMD's Ryzen and Epyc architectures are subject to major exploitable flaws. AMD said it hasn't had time to confirm or deny...


McAfee Launches Industry’s Most Comprehensive Cloud Security...

McAfee has announced that it has extended its Cloud Security Platform to consistently protect Microsoft Azure.



Intel issues Meltdown/Spectre fixes for Ivy Bridge, Sandy...

Intel has issued patches for the Spectre and Meltdown vulnerabilities to PCs using its Ivy Bridge and Sandy Bridge families of Core microprocessors, leaving just...


Latvian mobile operator invites cyber attackers to have...

Security researchers wanting to test the kind of malware that could break public networks now have a place to do so in safety



Cyber guru says CIOs need ‘attitudinal shifts’ towards risk...

CIOs need to focus on “internal collaboration” and reform cyber risk as a strategic business risk rather than an IT or information security one, says cyber specialist...


CyberGhost VPN review: A speedy VPN provider that's easy...

A recent change in ownership doesn't slow down this speedy VPN provider, but raises issues with your data.

Previous 1 3 4 5 238 239

Your Search returned 851 results from our White Paper Library

Sort By
Meru Networks


Security: Multiple Lines of Defense

To understand the unique vulnerabilities of wireless networks, it is necessary to analyze threats from the enterprise perspective. Wireless security vulnerabilities...

Admit One Security


Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Database Solutions

Preventing Enterprise Data Leaks

Discuss the growing internal threats to business information and know more about the impact of government regulations on the protection of data. Check...


Budgeting, Planning & Forecasting

Protection against Internal and External Threats

Is your midsized organization facing insecurity for the sake of platform consistency? Stop! With the right multi-level data protection against a wide range...


Regulatory Compliance

Make Compliance Work For You

Discover the five important steps to build embedded compliance architecture. Read on to learn how to deliver the best possible value for your IT budget...



SecureSphere Data Security Suite

This is the latest Technology Audit by Ovum Butler. View why Imperva's SecureSphere solution merits a closer evaluation by any organization keen on building...



State of Web Application Security

Ponemon Institute conducted this study to better understand the risk of insecure websites and how organizations’ are addressing internal and external threats.1...

Previous 1 3 4 5 85 86

Recommended for You


Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?