Your Search returned 164 results from our Editorial content

Sort By
  • Close-button

    Data Privacy and Security

BUSINESS MANAGEMENT

Obama won't pardon Snowden, despite petition

U.S. President Barack Obama won't pardon National Security Agency leaker Edward Snowden, despite strong public support for it, the White House said Tuesday.

INTERNET

NSA will lose access to phone surveillence data Nov. 29...

The U.S. National Security Agency will lose access to the bulk telephone records data it has collected at the end of November, the Office of the Director of National...

   

BUSINESS MANAGEMENT

New York judge rules against Facebook in search warrant...

A New York judge ruled Tuesday that Facebook has no legal standing to challenge the constitutionality of search warrants served on its users, highlighting the limits...

DATA PRIVACY AND SECURITY

Data deluge poses ethical conundrums on privacy

We don’t yet know how the ability to capture and inspect more information will affect us all

   

DATA PRIVACY AND SECURITY

Chris Froome hack shows how data analytics is eating sport...

An alleged hack of Team Sky highlights the criticality of data in modern sport

BUSINESS MANAGEMENT

ACLU asks court to immediately kill NSA phone snooping

A U.S. appeals court should immediately shut down the National Security Agency's bulk collection of domestic telephone records because the practice is illegal, the...

   

DATA PRIVACY AND SECURITY

PKWARE warn against confusing mere compliance with actual...

PKWARE CTO Joe Sturonas talks security, Wisconsin and the ZIP file.

BUSINESS MANAGEMENT

Former attorney general calls Snowden deal possible

The "possibility exists" for the U.S. Department of Justice to cut a deal that would allow surveillance leaker Edward Snowden to return to the U.S., a former attorney...

   

SECURITY

US, UK spies said to attack security software

Spies working for the U.S. National Security Agency and its British counterpart found anti-virus and security software a hindrance to their intelligence gathering...

BUSINESS MANAGEMENT

US wants to collect bulk call records for six more months...

The U.S. Department of Justice has filed to the Foreign Intelligence Surveillance Court for permission to continue the bulk collection of call records for another...

   
   
Previous 1 3 4 5 16 17

Your Search returned 226 results from our White Paper Library

Sort By
  • Close-button

    Data Privacy and Security

McAfee

Managed Services

A Buyer’s Guide to Data Protection

Implementing data protection products and processes can be daunting. Make the right decisions by exploring what is available and what makes sense for your...


Symantec Corporation

Network Security

7 Requirements of Data Loss Prevention: A guide to evaluating...

Not all vendor solutions are alike and many do not provide essential elements that adequately protect your confidential data. This report will provide...


Symantec Corporation

Network Security

Data Loss Prevention: Protect The Data That Drives Your...

Attend this webcast and learn how Data Loss Prevention (DLP) solutions enable business and government organizations to safeguard their most valuable assets...


IronKey

Data Privacy and Security

USB Security: Management, Protection and Virtualization...

There are approximately 300 million USB flashdrives in use today* — 25% in enterprises — and they are getting smarter. Improved intelligence, hardware-encryption...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Novell

Security

Securing Your Environment Using Novell ZENworks Endpoint...

ENDPOINT MANAGEMENT: Attend this session to learn how you can leverage the power of ZENworks Endpoint Security Management and ZENworks Network Access Control...


nuBridges

Data Privacy and Security

Managed File Transfer: Moving Your Business Forecast

Learn from a panel of experts as they discuss how many organizations are turning to Managed File Transfer solutions to handle their needs both today and...


Guardium

Data Privacy and Security

Creating a Database Security Plan -- Why Basic Database...

 SQL injection attacks and internal data thefts are on the rise—but DBAs spend less than 5% of their time on database security. View this on-demand webcast...


Previous 1 3 4 5 22 23
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/bit9-carbon-black
  • /view_company_report/213/brocade
  • /view_company_report/1590/check-point-software-technologies
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/1433/nutanix
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk

Poll

Is re-introducing the BBC microbit a good way to encourage kids into tech?”