Your Search returned 142 results from our Editorial content

Sort By
  • Close-button

    Data Privacy and Security

HANDHELD DEVICES

Long-awaited Blackphone tablet may emerge at MWC

Paranoid tablet users, rejoice. The first units of the secure Blackphone tablet will be demonstrated at the upcoming Mobile World Congress show in Barcelona early...

DATA PRIVACY AND SECURITY

Some hackers are unknowingly gathering intel for the NSA...

The U.S. National Security Agency and its intelligence partners are reportedly sifting through data stolen by state-sponsored and freelance hackers on a regular...

   

DATA PRIVACY AND SECURITY

Wynyard Group CEO: The future of crime fighting & privacy...

Wynyard Group CEO Craig Richardson talks crime analytics and the public’s privacy.

DATA PRIVACY AND SECURITY

To snoop or not to snoop: UK mulls way to go at crossroads...

The House of Lords is debating whether to approve broad extensions of the government’s right to keep track of citizens’ communications

   

DATA PRIVACY AND SECURITY

It’s UK versus Europe in the battle over data protection...

An EU split over data protection rules is building and will impact many organisations’ IT plans

DATA PRIVACY AND SECURITY

Microsoft Comment: Pledge to Safeguard Student Privacy

Microsoft VP of Education comments on student privacy safeguard

   

DATA PRIVACY AND SECURITY

Facebook: You post it, we can see it, and that's that

Facebook lets its users control whether other people can see the information they post, but when it comes to controlling what Facebook itself gets to see, privacy-conscious...

DATA PRIVACY AND SECURITY

Friday Rant: Tech Utopians v Luddites – They’re Both Wrong...

Whether you're for or against the fast-moving digital revolution, you can still learn from the opposing viewpoint.

   

DATA PRIVACY AND SECURITY

Syme, a social network that promised Ello-like privacy,...

A social network that attracted attention last year for its strong privacy features has quietly disappeared off the Web.

DATA PRIVACY AND SECURITY

New Zealand's Moment of Truth

Kim Dotcom promised revelations about the New Zealand government. Here's what actually happened on the night.

   
   
Previous 1 3 4 5 14 15

Your Search returned 205 results from our White Paper Library

Sort By
  • Close-button

    Data Privacy and Security

McAfee

Managed Services

A Buyer’s Guide to Data Protection

Implementing data protection products and processes can be daunting. Make the right decisions by exploring what is available and what makes sense for your...


Symantec Corporation

Network Security

7 Requirements of Data Loss Prevention: A guide to evaluating...

Not all vendor solutions are alike and many do not provide essential elements that adequately protect your confidential data. This report will provide...


Symantec Corporation

Network Security

Data Loss Prevention: Protect The Data That Drives Your...

Attend this webcast and learn how Data Loss Prevention (DLP) solutions enable business and government organizations to safeguard their most valuable assets...


IronKey

Data Privacy and Security

USB Security: Management, Protection and Virtualization...

There are approximately 300 million USB flashdrives in use today* — 25% in enterprises — and they are getting smarter. Improved intelligence, hardware-encryption...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Novell

Security

Securing Your Environment Using Novell ZENworks Endpoint...

ENDPOINT MANAGEMENT: Attend this session to learn how you can leverage the power of ZENworks Endpoint Security Management and ZENworks Network Access Control...


nuBridges

Data Privacy and Security

Managed File Transfer: Moving Your Business Forecast

Learn from a panel of experts as they discuss how many organizations are turning to Managed File Transfer solutions to handle their needs both today and...


Guardium

Data Privacy and Security

Creating a Database Security Plan -- Why Basic Database...

 SQL injection attacks and internal data thefts are on the rise—but DBAs spend less than 5% of their time on database security. View this on-demand webcast...


Previous 1 3 4 5 20 21
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/1590/check-point-software-technologies
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/1433/nutanix
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Would you buy a modular phone?