Your Search returned 20 results from our Editorial content

Sort By

ACCESS CONTROL

Google & the race for ‘finger-free’ smartphones

We look at Google’s Project Soli and what it may mean for future of tactile tech

HUMAN RESOURCES

Up in smoke: How marijuana shops in Colorado are protecting...

The moment I walk into the 3D Cannabis Center in Denver, Colorado, I'm approached by a security guard, taser on his hip, who requests my identification. As I fumble...

   

ACCESS CONTROL

NEC launches face-recognition protection for PCs

NEC has launched a biometric security program that uses face recognition to unlock access to PCs.

DATA PRIVACY AND SECURITY

Web apps and point-of-sale were leading hacker targets in...

Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report...

   

VOIP

Secusmart puts its BlackBerry encryption chip to work on...

At around €2,000 (US$2800) each, the secure smartphones that SecuSmart showed at Cebit last year were out of reach of many businesses -- although three governments...

DATA PRIVACY AND SECURITY

Amazon.com security slip allowed unlimited password guesses...

A gaping hole in Amazon.com's mobile application, now fixed, allowed hackers to have an unlimited number of attempts guessing a person's password, according to security...

   

SECURITY

Cybercriminals compromise home routers to attack online...

Attacks recently observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can intercept user connections to online...

ACCESS CONTROL

Snapchat's new image-based human verification system already...

Snapchat added an image-based security challenge to its account registration process to verify that new accounts are created by humans, but the system can easily...

   

WI-FI

Hacker-built drone can hunt, hijack other drones

A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones.

ACCESS CONTROL

Some password managers are safer than others

Susan Taylor worries that password managers may not be sufficiently secure. "What if the password manager company is hacked?"

   
   
Previous 1

Your Search returned 32 results from our White Paper Library

Sort By
CA Technologies

Server Virtualization

New Podcast: How to Secure Your Virtual Environment

Listen to the new CA podcast and learn everything you need to guarantee virtual security in 2011.


Cisco Systems, Inc.

Internet Security

Cisco 2010 Small Business

From IP-based video surveillance to social media security, you’ll learn how the latest technology will keep you not only up and running but ahead of the...


IBM

Database Administration

“Account Security” Chapter from HOWTO Secure and Audit Oracle...

Account security is one of the fundamental building blocks in ensuring a secure Oracle environment.


Citrix

Remote Access Technologies

Checklist for an Employee-Owned Notebook or PC Program

Provide employees complete control over their personal computing technology and free IT from managing non-strategic assets to focus on high-value, high...


IBM

Database Management

Triton Consulting: Comparing DBA Productivity An Oracle...

This study dives into six common DBA administration task areas, showing quantitatively that DB2 offers simpler administration and helps achieve time savings...


NetIQ

Access Control

Is your User Management Process Getting you Down?

This paper explains how automating user privileges can help you improve the security and efficiency of user provisioning, change user and de-provisioning....


Symantec Corporation

SSL

The Hidden Costs of Self-Signed SSL Certificates

This paper explores the true TCO for self-signed SSL certificates, including a sideby- side comparison of a self-signed architecture versus working with...


Cisco Systems, Inc.

WLAN

Cisco Plan and Build Service for Mobile Collaboration

When it’s time to bring secure mobility to your government organization, count on Cisco Services to help your team identify critical technical and operational...


Cisco Systems, Inc.

BYOD (Bring Your Own Device)

University Creates Flawless BYOD Experience for Staff and...

Brunel University needed to deliver wireless access to students in more than 70 buildings campus-wide.


Cisco Systems, Inc.

Access Control

Secure Network Access for Personal Mobile Devices

Any-device programs raise important questions about privacy and security—especially in government. In this white paper, you’ll discover the strategies...


Previous 1 3 4

Recommended for You

kathryn-cave

Blockchain For Dummies: What you really need to know

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

silhouette

Four hot IT growth areas to guarantee a big salary bump

IDG Connect tackles the tech stories that matter to you

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?