Your Search returned 36 results from our Editorial content

Sort By

ENCRYPTION

The case for electronic voting

Giovanni Verhaeghe from VASCO argues electronic voting is more not less secure

ENCRYPTION

Encrypted comms startup Wire lines up premium services

Swiss-headquartered startup Wire wants to make end-to-end encryption the default across user communications

   

ENCRYPTION

Exclusive: Apple acquires the FBI

Post- San Bernardino phone incident, Apple uses vast cash reserves to discover truth

MALWARE

Equation cyberspies use unrivaled, NSA-style techniques...

A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia....

   

SECURITY

WhatsApp adding end-to-end encryption to message service...

Ramping up efforts to keep its customers' messages safe from snooping, WhatsApp said Tuesday that it now supports end-to-end encryption for messages sent between...

EMAIL MANAGEMENT

Virtru launches business email encryption service for Google...

Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased...

   

ENCRYPTION

Crowdsourcing Innovation: Nadim Kobeissi, Lead Developer...

Crowdfunding sites are offering a new path for inventors with original ideas. We talk to inventors looking to gain the public’s favour...

ENCRYPTION

Typical 24: Christian Lanng, CEO, Tradeshift

IDG Connect is looking to speak to IT, business and marketing professionals across the spectrum to discover more about their very different, typical working days…...

   

ENCRYPTION

Here's how to chat with your Facebook friends using encryption...

Facebook's messaging application doesn't support encryption, but an open-source chat program, Cryptocat, has made it possible to chat with friends there over an...

DATA PRIVACY AND SECURITY

Leave no trace: Tips to cover your digital footprint and...

Privacy is at a premium. Whether it's the NSA, a hacker cabal, or corporate marketers, someone is looking over your shoulder every time you use your PC.

   
   
Previous 1 3 4

Your Search returned 0 results from our White Paper Library

Sort By

Blogs

adrian-schofield

South African ICT

The thorny issue of internet freedom across Africa

Adrian Schofield sheds light on tech in South Africa

martin-veitch-thumbnail

My day in the Jeff Bezos and Amazon forest

Martin Veitch's inside track on today’s tech trends

phil-muncaster

China Rising

Why WannaCry might make Microsoft cry in China

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should we donate our health data the same way we donate organs?