Your Search returned 49 results from our Editorial content

Sort By
  • Close-button

    Enterprise Data Protection

ENTERPRISE DATA PROTECTION

CloudSec: Cloud not the magical bullet for GDPR compliance...

GDPR Compliance can’t simply be achieved by putting your data on AWS.

ENTERPRISE DATA PROTECTION

Stop angry ex-employees from stealing your data

As more businesses move to the cloud many leave themselves exposed to disgruntled ex-employees

   

ENTERPRISE DATA PROTECTION

UK needs to align with GDPR, even post-Brexit

UK government needs to think carefully about data privacy if they don’t want to harm business.

ENTERPRISE DATA PROTECTION

InfoShot: What’s your IP worth to an employee?

Which of your employees would sell you out for the price of a slap-up meal?

   

INTERNET

NSA will lose access to phone surveillence data Nov. 29...

The U.S. National Security Agency will lose access to the bulk telephone records data it has collected at the end of November, the Office of the Director of National...

SECURITY

US, UK spies said to attack security software

Spies working for the U.S. National Security Agency and its British counterpart found anti-virus and security software a hindrance to their intelligence gathering...

   

ENTERPRISE DATA PROTECTION

A Week of Cyber Attacks – What Can Be Done?

How can businesses put up a defensive wall to stop attacks before they even access their data?

INTERNET

Snapchat settles FTC deception charges, will be monitored...

Snapchat has touted its mobile service as a platform for making messages vanish, but now it's being forced to own up to collecting and keeping information about...

   

INTERNET

Is that Twitter account a bot? Researchers make app to find...

They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.

ENTERPRISE DATA PROTECTION

Proposed EU Data Protection Law: 6 Topics CXOs Should Consider...

Six discussion points for CXOs and IT leaders to consider about their Enterprises’ data at all times, but which will be a particular focus if the EU data protection...

   
   
Previous 1 3 4 5

Your Search returned 276 results from our White Paper Library

Sort By
  • Close-button

    Enterprise Data Protection

Oracle

Database Solutions

Preventing Enterprise Data Leaks

Discuss the growing internal threats to business information and know more about the impact of government regulations on the protection of data. Check...


Oracle

Software

Key IT Drivers for Information Insight

Midsize organizations can make better business decisions by simplifying the extraction of specific, actionable information from large volumes of data....


Imperva

Enterprise Data Protection

Top-10 Guide for Protecting Sensitive Data from Malicious...

This guide will explore the top ten ways to protect sensitive data from the very people that need access to it. While this is a difficult problem to address,...


Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.


Symantec Corporation

Data Privacy and Security

Anatomy of a Data Breach

For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the...


Riverbed

Backup Systems and Services

Centralized Data Backup - It Doesn’t Have to Cripple Your...

Download this paper and learn about a proven strategy for combining WAN-based backup with WAN optimization solutions.


EMC Corporation

Enterprise Data Protection

Optimizing Data Protection for Virtual Environments

When virtualizing your environment, it is important to consider the impact that it will have on your data protection strategy. This paper explains how...


Symantec Corporation

Enterprise Data Protection

Integrating Data Protection and Archiving for Efficient...

Information management is becoming increasingly difficult. This IDC research paper explains how integrating data protection and archiving can make information...


Citrix

Remote Access Technologies

Solution Brief: BYO – Rethinking Your Device Strategy

Provide your employees and contractors the freedom and flexibility to use their own computer for work—while eliminating security, control and support issues....


Symantec Corporation

Server Virtualization

Best Practices for Breaking Down Barriers to Centralized...

This paper can help you overcome the challenges of server virtualization to ensure a successful backup and recovery strategy. Learn how to break down the...


Previous 1 3 4 5 27 28

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What you need to know about cryptocurrencies

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?