Your Search returned 145 results from our Editorial content

Sort By
  • Close-button

    Data Privacy and Security

SECURITY

Verizon subscribers can now opt out of 'supercookies'

Verizon customers can now opt out of having a unique identifier placed on their phones that critics have labelled a 'supercookie' because it's almost impossible...

   

DATA PRIVACY AND SECURITY

Top Tips: Securing a datacentre

Five top tips on how to secure your datacentre

HANDHELD DEVICES

Long-awaited Blackphone tablet may emerge at MWC

Paranoid tablet users, rejoice. The first units of the secure Blackphone tablet will be demonstrated at the upcoming Mobile World Congress show in Barcelona early...

   

DATA PRIVACY AND SECURITY

Some hackers are unknowingly gathering intel for the NSA...

The U.S. National Security Agency and its intelligence partners are reportedly sifting through data stolen by state-sponsored and freelance hackers on a regular...

DATA PRIVACY AND SECURITY

Wynyard Group CEO: The future of crime fighting & privacy...

Wynyard Group CEO Craig Richardson talks crime analytics and the public’s privacy.

   

DATA PRIVACY AND SECURITY

To snoop or not to snoop: UK mulls way to go at crossroads...

The House of Lords is debating whether to approve broad extensions of the government’s right to keep track of citizens’ communications

DATA PRIVACY AND SECURITY

It’s UK versus Europe in the battle over data protection...

An EU split over data protection rules is building and will impact many organisations’ IT plans

   

DATA PRIVACY AND SECURITY

Microsoft Comment: Pledge to Safeguard Student Privacy

Microsoft VP of Education comments on student privacy safeguard

DATA PRIVACY AND SECURITY

Facebook: You post it, we can see it, and that's that

Facebook lets its users control whether other people can see the information they post, but when it comes to controlling what Facebook itself gets to see, privacy-conscious...

   
   
Previous 1 3 4 5 14 15

Your Search returned 212 results from our White Paper Library

Sort By
  • Close-button

    Data Privacy and Security

McAfee

Managed Services

A Buyer’s Guide to Data Protection

Implementing data protection products and processes can be daunting. Make the right decisions by exploring what is available and what makes sense for your...


Symantec Corporation

Network Security

7 Requirements of Data Loss Prevention: A guide to evaluating...

Not all vendor solutions are alike and many do not provide essential elements that adequately protect your confidential data. This report will provide...


Symantec Corporation

Network Security

Data Loss Prevention: Protect The Data That Drives Your...

Attend this webcast and learn how Data Loss Prevention (DLP) solutions enable business and government organizations to safeguard their most valuable assets...


IronKey

Data Privacy and Security

USB Security: Management, Protection and Virtualization...

There are approximately 300 million USB flashdrives in use today* — 25% in enterprises — and they are getting smarter. Improved intelligence, hardware-encryption...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Novell

Security

Securing Your Environment Using Novell ZENworks Endpoint...

ENDPOINT MANAGEMENT: Attend this session to learn how you can leverage the power of ZENworks Endpoint Security Management and ZENworks Network Access Control...


nuBridges

Data Privacy and Security

Managed File Transfer: Moving Your Business Forecast

Learn from a panel of experts as they discuss how many organizations are turning to Managed File Transfer solutions to handle their needs both today and...


Guardium

Data Privacy and Security

Creating a Database Security Plan -- Why Basic Database...

 SQL injection attacks and internal data thefts are on the rise—but DBAs spend less than 5% of their time on database security. View this on-demand webcast...


Previous 1 3 4 5 21 22

Blogs

phil-muncaster

China Rising

Why are Chinese tech giants slumping on US stock markets?

Phil Muncaster reports on China and beyond

rupert-goodwins

Tech Transformations

We can end this new IT security Cold War

Rupert Goodwins’ unique angle on tech change

jon-collins

Thinking Different

How much are banks risking on mobile services?

Jon Collins’ in-depth look at tech and society

no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/1590/check-point-software-technologies
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/1433/nutanix
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/1242/teradata

Poll

Would you buy a modular phone?