Len Padilla, Vice President Product Strategy, NTT Communications Europe discusses how ICT decision-makers have responded to PRISM allegations
Amendments show the new frontiers in data privacy and rights and asks ticklish questions of cloud service providers
Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report...
Privacy is at a premium. Whether it's the NSA, a hacker cabal, or corporate marketers, someone is looking over your shoulder every time you use your PC.
Orwell, Zamyatin, Huxley and others foresaw the dangers of utopian views of technology
The official calendar for Joshua Wright, a commissioner with the U.S. Federal Trade Commission, shows he has had many meetings with technology company lobbyists,...
A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.
The revelation that Microsoft read emails from a user’s private account underlines the importance of understanding terms and conditions
Read on to learn more about cyber protection in “secure communities.”
This paper will now discuss those different elements and attempts to enrich the debate on the various legal issues raised by IoT.
Read this report for an in-depth analysis of the latest security threats and trends.
This white paper provides advice on how organizations create an environment for secure data transfer.
This article provides five key DDoS mitigation steps enterprises can take now to prepare for a future attack.
This paper looks at how internal security threats are affecting UK organizations and, in turn, how these are being managed.
This report offers a study of attitudes, behavior and best practice within European business, including an updated Information Risk Maturity Index.
Featuring a survey of over 200 business & IT professionals from 42 countries, this white paper from IDG Connect looks at awareness of Data Sovereignty...
This white paper presents a social study that reveals attitudes to wearable technology and examines how cloud computing is enabling this new generation...