Your Search returned 112 results from our Editorial content

Sort By
  • Close-button

    Data Privacy and Security

DATA PRIVACY AND SECURITY

Leave no trace: Tips to cover your digital footprint and...

Privacy is at a premium. Whether it's the NSA, a hacker cabal, or corporate marketers, someone is looking over your shoulder every time you use your PC.

DATA PRIVACY AND SECURITY

Top Tips: Safeguard Against Risks to Data Storage

5 top tips on how a business can prepare and proactively safeguard against risks to its data storage.

   

DATA PRIVACY AND SECURITY

30 Years after 1984, Novels Can Teach Tech Utopians Lessons...

Orwell, Zamyatin, Huxley and others foresaw the dangers of utopian views of technology

BUSINESS MANAGEMENT

FTC Commissioner Wright's calendar heavy on lobbyists, light...

The official calendar for Joshua Wright, a commissioner with the U.S. Federal Trade Commission, shows he has had many meetings with technology company lobbyists,...

   

DATA PRIVACY AND SECURITY

Sality malware, growing old, takes on a new trick

A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.

DATA PRIVACY AND SECURITY

The Sneaky Ts and Cs Buried In Cloud User Agreements

The revelation that Microsoft read emails from a user’s private account underlines the importance of understanding terms and conditions

   

SOFTWARE

How to hide your online searches: We browse incognito with...

Services that mask your identity online can preserve your privacy, but they can also be slow and unwieldy. Disconnect said Monday it had tweaked and upgraded its...

DATA PRIVACY AND SECURITY

How to disable Windows 8's deep cloud integration, piece...

You can accuse Windows 8.1 of a lot of things, but one thing you can't say about Microsoft's latest OS is that it lacks web integration. Thanks to deep integration...

   

DATA PRIVACY AND SECURITY

Europe Raises Red Flag over Safe Harbour’s Choppy Waters...

There’s general agreement that Safe Harbour is no longer fit for purpose, less so on alternatives

DATA PRIVACY AND SECURITY

Speedy attack targets Web servers with outdated Linux kernels...

Web servers running a long-outdated version of the Linux kernel were attacked with dramatic speed over two days last week, Cisco Systems said on Thursday.

   
   
Previous 1 3 4 5 11 12

Your Search returned 202 results from our White Paper Library

Sort By
  • Close-button

    Data Privacy and Security

Unisys

Enterprise Data Protection

Data Security Borderless Enterprise

Read on to learn more about cyber protection in “secure communities.”


Alain Bensoussan law firm

Data Privacy and Security

The Internet of Things, Legal Aspects What Will Change (Everything)…...

This paper will now discuss those different elements and attempts to enrich the debate on the various legal issues raised by IoT.


IBM

Security

IBM X-Force 2013 Mid-Year Trend and Risk Report

Read this report for an in-depth analysis of the latest security threats and trends.


Maytech

File Transfer

Enabling Large File Transfers Without Making It The Wild...

This white paper provides advice on how organizations create an environment for secure data transfer.


VeriSign

Security

Five Steps To Prepare For A DDoS Attack

This article provides five key DDoS mitigation steps enterprises can take now to prepare for a future attack.


OpenText

Networking & Communications

Communicating & Storing Sensitive Information

This video provides an overview of a new research report on the current state of data security in sectors where data protection is critical.


Clearswift

Enterprise Data Protection

2013 ‘The Enemy Within’ Report

This paper looks at how internal security threats are affecting UK organizations and, in turn, how these are being managed.


PwC (PricewaterhouseCoopers LLP)

Database Management

Beyond Awareness: the Growing Urgency for Data Management...

This report offers a study of attitudes, behavior and best practice within European business, including an updated Information Risk Maturity Index.


IDG Connect

Cloud Computing Security

Data Sovereignty

Featuring a survey of over 200 business & IT professionals from 42 countries, this white paper from IDG Connect looks at awareness of Data Sovereignty...


Rackspace

Business Technology Optimization

The Human Cloud: Wearable Technology from Novelty to Production...

This white paper presents a social study that reveals attitudes to wearable technology and examines how cloud computing is enabling this new generation...


Previous 1 3 4 5 20 21

Most Recent Comments

IDG Connections

  • conect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • conect
  • conect
  • conect
  • conect
  • conect
no-image

Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/16/netapp
  • /view_company_report/506/qualys
  • /view_company_report/1304/ringcentral-inc
  • /view_company_report/1242/teradata

Poll

Is tech more of a problem or solution to climate change?