Your Search returned 135 results from our Editorial content

Sort By
  • Close-button

    Data Privacy and Security

DATA PRIVACY AND SECURITY

Friday Rant: Tech Utopians v Luddites – They’re Both Wrong...

Whether you're for or against the fast-moving digital revolution, you can still learn from the opposing viewpoint.

DATA PRIVACY AND SECURITY

Syme, a social network that promised Ello-like privacy,...

A social network that attracted attention last year for its strong privacy features has quietly disappeared off the Web.

   

DATA PRIVACY AND SECURITY

New Zealand's Moment of Truth

Kim Dotcom promised revelations about the New Zealand government. Here's what actually happened on the night.

   

DATA PRIVACY AND SECURITY

Viewpoint: Germany, Google & the Stasi Legacy

Rafael Laguna, CEO of German software company, Open-Xchange provides a cultural perspective on Germany’s attitude to Google

DATA PRIVACY AND SECURITY

Social Media and the ‘Spiral of Silence’?

New research from Pew only speak up about policy issues if their opinion is likely to be shared

   

DATA PRIVACY AND SECURITY

Friday Rant: Your Computer Says You're A Terrorist

You have the right to remain silent, but your phone and web records will drop you right in it.

DATA PRIVACY AND SECURITY

Tech and Employee Education Must Work in Tandem to Drive...

Yesterday's ICO annual report revealed a significant increase in the amount of data protection cases brought to its attention.

   

DATA PRIVACY AND SECURITY

Infographic: Are You Concerned About Your Online Identity?...

As our identities increasingly move online we survey 56 senior IT professionals around the world to discover their views.

DATA PRIVACY AND SECURITY

How to Protect Against the ‘Human Factor’

Expert comment on the recent news that the ICO has hit out at the Student Loans Company for a series of data breaches

   
   
Previous 1 3 4 5 13 14

Your Search returned 198 results from our White Paper Library

Sort By
  • Close-button

    Data Privacy and Security

McAfee

Managed Services

A Buyer’s Guide to Data Protection

Implementing data protection products and processes can be daunting. Make the right decisions by exploring what is available and what makes sense for your...


Symantec Corporation

Network Security

7 Requirements of Data Loss Prevention: A guide to evaluating...

Not all vendor solutions are alike and many do not provide essential elements that adequately protect your confidential data. This report will provide...


Symantec Corporation

Network Security

Data Loss Prevention: Protect The Data That Drives Your...

Attend this webcast and learn how Data Loss Prevention (DLP) solutions enable business and government organizations to safeguard their most valuable assets...


IronKey

Data Privacy and Security

USB Security: Management, Protection and Virtualization...

There are approximately 300 million USB flashdrives in use today* — 25% in enterprises — and they are getting smarter. Improved intelligence, hardware-encryption...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Novell

Security

Securing Your Environment Using Novell ZENworks Endpoint...

ENDPOINT MANAGEMENT: Attend this session to learn how you can leverage the power of ZENworks Endpoint Security Management and ZENworks Network Access Control...


nuBridges

Data Privacy and Security

Managed File Transfer: Moving Your Business Forecast

Learn from a panel of experts as they discuss how many organizations are turning to Managed File Transfer solutions to handle their needs both today and...


Guardium

Data Privacy and Security

Creating a Database Security Plan -- Why Basic Database...

 SQL injection attacks and internal data thefts are on the rise—but DBAs spend less than 5% of their time on database security. View this on-demand webcast...


Previous 1 3 4 5 19 20
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Would you buy a modular phone?