Your Search returned 116 results from our Editorial content

Sort By
  • Close-button

    Data Privacy and Security

DATA PRIVACY AND SECURITY

NSA Aftershocks: Businesses in the Wake of Snowden

Len Padilla, Vice President Product Strategy, NTT Communications Europe discusses how ICT decision-makers have responded to PRISM allegations

DATA PRIVACY AND SECURITY

Australia’s Federal Privacy Act Gives Watchdog Teeth

Amendments show the new frontiers in data privacy and rights and asks ticklish questions of cloud service providers

   

DATA PRIVACY AND SECURITY

Web apps and point-of-sale were leading hacker targets in...

Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report...

SOFTWARE

Protect your privacy while you browse

It once sounded like paranoia; now it's more like common sense. Steve asked for safe and secure ways to access the Internet without being tracked by crooks, corporations,...

   

DATA PRIVACY AND SECURITY

Leave no trace: Tips to cover your digital footprint and...

Privacy is at a premium. Whether it's the NSA, a hacker cabal, or corporate marketers, someone is looking over your shoulder every time you use your PC.

DATA PRIVACY AND SECURITY

Top Tips: Safeguard Against Risks to Data Storage

5 top tips on how a business can prepare and proactively safeguard against risks to its data storage.

   

DATA PRIVACY AND SECURITY

30 Years after 1984, Novels Can Teach Tech Utopians Lessons...

Orwell, Zamyatin, Huxley and others foresaw the dangers of utopian views of technology

BUSINESS MANAGEMENT

FTC Commissioner Wright's calendar heavy on lobbyists, light...

The official calendar for Joshua Wright, a commissioner with the U.S. Federal Trade Commission, shows he has had many meetings with technology company lobbyists,...

   

DATA PRIVACY AND SECURITY

Sality malware, growing old, takes on a new trick

A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.

DATA PRIVACY AND SECURITY

The Sneaky Ts and Cs Buried In Cloud User Agreements

The revelation that Microsoft read emails from a user’s private account underlines the importance of understanding terms and conditions

   
   
Previous 1 3 4 5 11 12

Your Search returned 204 results from our White Paper Library

Sort By
  • Close-button

    Data Privacy and Security

Unisys

Enterprise Data Protection

Data Security Borderless Enterprise

Read on to learn more about cyber protection in “secure communities.”


Alain Bensoussan law firm

Data Privacy and Security

The Internet of Things, Legal Aspects What Will Change (Everything)…...

This paper will now discuss those different elements and attempts to enrich the debate on the various legal issues raised by IoT.


IBM

Security

IBM X-Force 2013 Mid-Year Trend and Risk Report

Read this report for an in-depth analysis of the latest security threats and trends.


Maytech

File Transfer

Enabling Large File Transfers Without Making It The Wild...

This white paper provides advice on how organizations create an environment for secure data transfer.


VeriSign

Security

Five Steps To Prepare For A DDoS Attack

This article provides five key DDoS mitigation steps enterprises can take now to prepare for a future attack.


OpenText

Networking & Communications

Communicating & Storing Sensitive Information

This video provides an overview of a new research report on the current state of data security in sectors where data protection is critical.


Clearswift

Enterprise Data Protection

2013 ‘The Enemy Within’ Report

This paper looks at how internal security threats are affecting UK organizations and, in turn, how these are being managed.


PwC (PricewaterhouseCoopers LLP)

Database Management

Beyond Awareness: the Growing Urgency for Data Management...

This report offers a study of attitudes, behavior and best practice within European business, including an updated Information Risk Maturity Index.


IDG Connect

Cloud Computing Security

Data Sovereignty

Featuring a survey of over 200 business & IT professionals from 42 countries, this white paper from IDG Connect looks at awareness of Data Sovereignty...


Rackspace

Business Technology Optimization

The Human Cloud: Wearable Technology from Novelty to Production...

This white paper presents a social study that reveals attitudes to wearable technology and examines how cloud computing is enabling this new generation...


Previous 1 3 4 5 20 21

Most Recent Comments

IDG Connections

  • conect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • conect
  • conect
  • conect
  • conect
  • conect
no-image

Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/16/netapp
  • /view_company_report/506/qualys
  • /view_company_report/1304/ringcentral-inc
  • /view_company_report/1242/teradata

Poll

Is tech more of a problem or solution to climate change?