Your Search returned 6 results from our Editorial content

Sort By


The dark web & business report: A seedy Dickensian underworld...

We collate the opinions of 31 experts to discover the things businesses really need to know about the dark web


News Roundup: 3D Misery, Nudes and Conscious Homes

A roundup of the week’s tech news including Nokia Rises, In-App Punks and Glassfails



CEO Talks Project Isizwe, Free WiFi for South Africa

Alan Knott-Craig, CEO of Project Isizwe, explains more about the South African free WiFi initiative


Rant: Heartbleed – I Should Have Stuck With Windows

Two-thirds of the web has been compromised by code written by an under-resourced team. Duh.



The Future of the Net was in Brazil… And Then It Left

NET Mundial in Brazil promised to tackle neutrality and human rights. What happened?


Billions Don't Trust the Internet - What Can Be Done?

Neelie Kroes, European Commission vice-president, claimed that billions of people around the world do not trust the internet. So what can be done?


Your Search returned 157 results from our White Paper Library

Sort By

Patch Management

Security Exposure: Software Portfolios

Read an empirical analysis of the patching challenge faced by the average private user.



Eight ‘Must Haves’ Firewall Rules

With the torrent of new threats resulting from Web 2.0, it’s likely that your existing firewall is leaving you exposed.

Symantec Corporation

Internet Security

Internet Security Threat Report: Tips for SMBs on how to...

Please read the “Quick Tips for SMBs” that were gleaned from the Threat Report to learn more about how to help your company protect their business information....

Symantec Corporation


Symantec Internet Security Threat Report

Symantec’s analysts unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious...


Internet Security

Seven Criteria for Evaluating Security-as-a-Service (SaaS)...

SaaS is increasing in popularity as an effective and lower total-cost delivery platform. This paper looks at the top seven criteria to reduce the cost...


Internet Security

How Technology Unification Delivers the Best Security with...

This whitepaper looks at how security framework empowers organizations to leverage Internet communications channels and Web 2.0 applications without increasing...


Email Encryption

Email Threats

Review this insider's guide to gain valuable insight into how the email security market is changing and learn what you should take into account when reviewing...


Internet Security

Next-Generation Secure Web Gateways: The Case and Criteria...

The secure web gateway (SWG) is a logical consolidation point in this regard, offering the potential for reduced infrastructure, complexity, and cost of...

Cisco Systems, Inc.

Internet Security

Cisco 2010 Small Business

From IP-based video surveillance to social media security, you’ll learn how the latest technology will keep you not only up and running but ahead of the...


Data Privacy and Security

A Buyer's Guide to Data Loss Protection Solutions

Data loss prevention (DLP) solutions are necessary to prevent the loss of sensitive and confidential information.

Previous 1 3 4 5 15 16



Thinking Different

In 2016, get ready for the mobile API explosion

Jon Collins’ in-depth look at tech and society


China Rising

How far can China push its bid to control the internet?

Phil Muncaster reports on China and beyond


Most Recent Comments


Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems


Does Altruistic Malware introduce more risk despite good intentions?