Your Search returned 47 results from our Editorial content

Sort By
  • Close-button

    Enterprise Data Protection


UK needs to align with GDPR, even post-Brexit

UK government needs to think carefully about data privacy if they don’t want to harm business.


InfoShot: What’s your IP worth to an employee?

Which of your employees would sell you out for the price of a slap-up meal?



NSA will lose access to phone surveillence data Nov. 29...

The U.S. National Security Agency will lose access to the bulk telephone records data it has collected at the end of November, the Office of the Director of National...


US, UK spies said to attack security software

Spies working for the U.S. National Security Agency and its British counterpart found anti-virus and security software a hindrance to their intelligence gathering...



A Week of Cyber Attacks – What Can Be Done?

How can businesses put up a defensive wall to stop attacks before they even access their data?


Snapchat settles FTC deception charges, will be monitored...

Snapchat has touted its mobile service as a platform for making messages vanish, but now it's being forced to own up to collecting and keeping information about...



Is that Twitter account a bot? Researchers make app to find...

They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.


Proposed EU Data Protection Law: 6 Topics CXOs Should Consider...

Six discussion points for CXOs and IT leaders to consider about their Enterprises’ data at all times, but which will be a particular focus if the EU data protection...



Web apps and point-of-sale were leading hacker targets in...

Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report...


Netcraft tool flags websites affected by Heartbleed

Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.

Previous 1 3 4 5

Your Search returned 250 results from our White Paper Library

Sort By
  • Close-button

    Enterprise Data Protection


Database Solutions

Preventing Enterprise Data Leaks

Discuss the growing internal threats to business information and know more about the impact of government regulations on the protection of data. Check...



Key IT Drivers for Information Insight

Midsize organizations can make better business decisions by simplifying the extraction of specific, actionable information from large volumes of data....


Enterprise Data Protection

Top-10 Guide for Protecting Sensitive Data from Malicious...

This guide will explore the top ten ways to protect sensitive data from the very people that need access to it. While this is a difficult problem to address,...

Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.

Symantec Corporation

Data Privacy and Security

Anatomy of a Data Breach

For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the...


Backup Systems and Services

Centralized Data Backup - It Doesn’t Have to Cripple Your...

Download this paper and learn about a proven strategy for combining WAN-based backup with WAN optimization solutions.

EMC Corporation

Enterprise Data Protection

Optimizing Data Protection for Virtual Environments

When virtualizing your environment, it is important to consider the impact that it will have on your data protection strategy. This paper explains how...

Symantec Corporation

Enterprise Data Protection

Integrating Data Protection and Archiving for Efficient...

Information management is becoming increasingly difficult. This IDC research paper explains how integrating data protection and archiving can make information...


Remote Access Technologies

Solution Brief: BYO – Rethinking Your Device Strategy

Provide your employees and contractors the freedom and flexibility to use their own computer for work—while eliminating security, control and support issues....

Symantec Corporation

Server Virtualization

Best Practices for Breaking Down Barriers to Centralized...

This paper can help you overcome the challenges of server virtualization to ensure a successful backup and recovery strategy. Learn how to break down the...

Previous 1 3 4 5 24 25

Recommended for You


Which Enterprise Password Managers work the best?

IDG Connect tackles the tech stories that matter to you


The IoT “time bomb” report: 49 security experts share their views

Kathryn Cave looks at the big trends in global tech


China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should companies have Bitcoins on hand in preparation for a Ransomware attack?