Your Search returned 49 results from our Editorial content

Sort By
  • Close-button

    Enterprise Data Protection


CloudSec: Cloud not the magical bullet for GDPR compliance...

GDPR Compliance can’t simply be achieved by putting your data on AWS.


Stop angry ex-employees from stealing your data

As more businesses move to the cloud many leave themselves exposed to disgruntled ex-employees



UK needs to align with GDPR, even post-Brexit

UK government needs to think carefully about data privacy if they don’t want to harm business.


InfoShot: What’s your IP worth to an employee?

Which of your employees would sell you out for the price of a slap-up meal?



NSA will lose access to phone surveillence data Nov. 29...

The U.S. National Security Agency will lose access to the bulk telephone records data it has collected at the end of November, the Office of the Director of National...


US, UK spies said to attack security software

Spies working for the U.S. National Security Agency and its British counterpart found anti-virus and security software a hindrance to their intelligence gathering...



A Week of Cyber Attacks – What Can Be Done?

How can businesses put up a defensive wall to stop attacks before they even access their data?


Snapchat settles FTC deception charges, will be monitored...

Snapchat has touted its mobile service as a platform for making messages vanish, but now it's being forced to own up to collecting and keeping information about...



Is that Twitter account a bot? Researchers make app to find...

They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.


Proposed EU Data Protection Law: 6 Topics CXOs Should Consider...

Six discussion points for CXOs and IT leaders to consider about their Enterprises’ data at all times, but which will be a particular focus if the EU data protection...

Previous 1 3 4 5

Your Search returned 289 results from our White Paper Library

Sort By
  • Close-button

    Enterprise Data Protection


Database Solutions

Preventing Enterprise Data Leaks

Discuss the growing internal threats to business information and know more about the impact of government regulations on the protection of data. Check...



Key IT Drivers for Information Insight

Midsize organizations can make better business decisions by simplifying the extraction of specific, actionable information from large volumes of data....


Enterprise Data Protection

Top-10 Guide for Protecting Sensitive Data from Malicious...

This guide will explore the top ten ways to protect sensitive data from the very people that need access to it. While this is a difficult problem to address,...

Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.

Symantec Corporation

Data Privacy and Security

Anatomy of a Data Breach

For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the...


Backup Systems and Services

Centralized Data Backup - It Doesn’t Have to Cripple Your...

Download this paper and learn about a proven strategy for combining WAN-based backup with WAN optimization solutions.

EMC Corporation

Enterprise Data Protection

Optimizing Data Protection for Virtual Environments

When virtualizing your environment, it is important to consider the impact that it will have on your data protection strategy. This paper explains how...

Symantec Corporation

Enterprise Data Protection

Integrating Data Protection and Archiving for Efficient...

Information management is becoming increasingly difficult. This IDC research paper explains how integrating data protection and archiving can make information...


Remote Access Technologies

Solution Brief: BYO – Rethinking Your Device Strategy

Provide your employees and contractors the freedom and flexibility to use their own computer for work—while eliminating security, control and support issues....

Symantec Corporation

Server Virtualization

Best Practices for Breaking Down Barriers to Centralized...

This paper can help you overcome the challenges of server virtualization to ensure a successful backup and recovery strategy. Learn how to break down the...

Previous 1 3 4 5 28 29

Recommended for You


Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should the government regulate Artificial Intelligence?