Your Search returned 20 results from our Editorial content

Sort By


Google & the race for ‘finger-free’ smartphones

We look at Google’s Project Soli and what it may mean for future of tactile tech


Up in smoke: How marijuana shops in Colorado are protecting...

The moment I walk into the 3D Cannabis Center in Denver, Colorado, I'm approached by a security guard, taser on his hip, who requests my identification. As I fumble...



NEC launches face-recognition protection for PCs

NEC has launched a biometric security program that uses face recognition to unlock access to PCs.


Web apps and point-of-sale were leading hacker targets in...

Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report...



Secusmart puts its BlackBerry encryption chip to work on...

At around €2,000 (US$2800) each, the secure smartphones that SecuSmart showed at Cebit last year were out of reach of many businesses -- although three governments...

DATA PRIVACY AND SECURITY security slip allowed unlimited password guesses...

A gaping hole in's mobile application, now fixed, allowed hackers to have an unlimited number of attempts guessing a person's password, according to security...



Cybercriminals compromise home routers to attack online...

Attacks recently observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can intercept user connections to online...


Snapchat's new image-based human verification system already...

Snapchat added an image-based security challenge to its account registration process to verify that new accounts are created by humans, but the system can easily...



Hacker-built drone can hunt, hijack other drones

A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones.


Some password managers are safer than others

Susan Taylor worries that password managers may not be sufficiently secure. "What if the password manager company is hacked?"

Previous 1

Your Search returned 37 results from our White Paper Library

Sort By
CA Technologies

Server Virtualization

New Podcast: How to Secure Your Virtual Environment

Listen to the new CA podcast and learn everything you need to guarantee virtual security in 2011.

Cisco Systems, Inc.

Internet Security

Cisco 2010 Small Business

From IP-based video surveillance to social media security, you’ll learn how the latest technology will keep you not only up and running but ahead of the...


Database Administration

“Account Security” Chapter from HOWTO Secure and Audit Oracle...

Account security is one of the fundamental building blocks in ensuring a secure Oracle environment.


Remote Access Technologies

Checklist for an Employee-Owned Notebook or PC Program

Provide employees complete control over their personal computing technology and free IT from managing non-strategic assets to focus on high-value, high...


Database Management

Triton Consulting: Comparing DBA Productivity An Oracle...

This study dives into six common DBA administration task areas, showing quantitatively that DB2 offers simpler administration and helps achieve time savings...


Access Control

Is your User Management Process Getting you Down?

This paper explains how automating user privileges can help you improve the security and efficiency of user provisioning, change user and de-provisioning....

Symantec Corporation


The Hidden Costs of Self-Signed SSL Certificates

This paper explores the true TCO for self-signed SSL certificates, including a sideby- side comparison of a self-signed architecture versus working with...

Cisco Systems, Inc.


Cisco Plan and Build Service for Mobile Collaboration

When it’s time to bring secure mobility to your government organization, count on Cisco Services to help your team identify critical technical and operational...

Cisco Systems, Inc.

BYOD (Bring Your Own Device)

University Creates Flawless BYOD Experience for Staff and...

Brunel University needed to deliver wireless access to students in more than 70 buildings campus-wide.

Cisco Systems, Inc.

Access Control

Secure Network Access for Personal Mobile Devices

Any-device programs raise important questions about privacy and security—especially in government. In this white paper, you’ll discover the strategies...

Previous 1 3 4

Recommended for You


Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should the government regulate Artificial Intelligence?