Your Search returned 76 results from our Editorial content

Sort By


Why WannaCry might make Microsoft cry in China

China’s reliance on illegitimate software means it was hit even harder than the west


Could blockchain solve the threat of ransomware?

Ian Smith, CEO of Gospel Technology, argues a new data culture is coming, one where the value of data is understood and realised.



People & processes (not patches) responsible for WannaCry...

Andrew Douthwaite of VirtualArmour describes how WannaCry spread and what we can learn from all this


Bitdefender CEO on past revolution, future shocks

Bitdefender CEO Florin Talpes has dealt with every kind of insecurity, including collapsing regimes and cyber sabotage.



Latin America begins to acknowledge the serious threats...

As Mexico takes a stand against cyber threats, what about the rest of LatAm?


Cinema chain hack sees data security take centre stage in...

What does South Africa’s largest breach reveal about data security in Africa?



Consumers shouldn’t be responsible for IoT device security...

Thibaut Rouffineau, Head of Devices at Ubuntu, says it’s time IoT manufactures take security seriously.


Cyber-Security Congress: politics driving cyber-security...

Experts warn of politically motivated threats as much as monetary.



How to keep up with the changing face of cybercrime

CFC Underwriting discusses the increasing demand for cyber insurance in the UK (although nothing compared to the US)


Cybersecurity must play catch up as more Kenyans move online...

Reports have highlighted Kenya’s vulnerability to cyber attacks. Predictive technology could help secure businesses and government entities.

Previous 1 3 4 5 6 7 8

Your Search returned 193 results from our White Paper Library

Sort By
Symantec Corporation


SMB Information Protection Survey Report

Read this report to learn the simple steps SMBs can take to improve their information protection footing.

Cloud Computing Platforms

Next Generation of Web Exploits: When Good Sites Go Bad...

Download this FREE whitepaper to find out about the latest generation of Web attacks and what you can do to protect your organization.


Network Security

Protecting Online Channels and Web Applications

This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets.

Symantec Corporation


Norton Cybercrime Report 2011

431 million people around the world become victims of cybercrime every year. This report reveals the latest stats from around the world, with a tailored...

Cisco Systems, Inc.

Email Encryption

Email Attacks: This Time It’s Personal

Cyber criminals are moving away from mass spam attacks towards using highly-personalized methods. This research paper from Cisco examines this new trend...

Symantec Corporation

Internet Security

Symantec Internet Security Threat Report 2013

Get an overview and analysis of the year in global threat activity with the Symantec Internet Security Threat Report 2013. This report provides commentary...



Counter Stealth Attacks - Unmask Stealthy Villains

This paper looks why Stealth Attacks, including why they are often successful and how to prevent them.


Fraud Detection & Prevention

Fighting Fraud with Big Data Visibility and Intelligence...

This report reveals how solution providers are fighting fraud with big data visibility and intelligence.

Symantec Corporation

Threat and Vulnerability Management

Protect Against Targeted Attacks With Security Intelligence...

See how the use of security intelligence services can help organizations to defend against ATPs and targeted attacks in this IDC paper.



Cybercrime and the underground internet economy

This video reveals what goes on behind-the-scenes in the world of cybercrime.

Previous 1 3 4 5 19 20



My day in the Jeff Bezos and Amazon forest

Martin Veitch's inside track on today’s tech trends


China Rising

Why WannaCry might make Microsoft cry in China

Phil Muncaster reports on China and beyond


Doubting Disruption

Can we stop with all the Snapchat clones?

Dan Swinhoe casts a critical eye on the future

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should we donate our health data the same way we donate organs?