Your Search returned 0 results from our Editorial content

Sort By
  • Close-button

    Managed Security Services


Your Search returned 56 results from our White Paper Library

Sort By
  • Close-button

    Managed Security Services


Endpoint Security

Does Device Sprawl Threaten Your Data?: Reducing data loss...

According to McAfee’s 2009 Unsecured Economies report, companies lost $1 trillion worldwide because of data loss, both malicious and accidental.

Symantec Corporation

Internet Security

Internet Security Threat Report: Tips for SMBs on how to...

Please read the “Quick Tips for SMBs” that were gleaned from the Threat Report to learn more about how to help your company protect their business information....

Symantec Corporation

Data Privacy and Security

Anatomy of a Data Breach

For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the...

Cloud Computing Platforms

Next Generation of Web Exploits: When Good Sites Go Bad...

Download this FREE whitepaper to find out about the latest generation of Web attacks and what you can do to protect your organization.


Managed Security Services

X-Force® 2010 Trend and Risk Report

The IBM X-Force 2010 Trend and Risk Report provides an overview of last year's security lessons, including statistical information about all aspects of...



Security Management 2.0: Time to Replace Your SIEM?

Is it time? Are you waving the white flag? Has your first-gen SIEM failed to meet expectations despite your investment? If you are questioning whether...

Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....

Symantec Corporation

Threat and Vulnerability Management

Internet Security Threat Report 2013

This report focuses on the threats that impacts websites and online business. Learn about the latest dangers and security trends.

Symantec Corporation

Threat and Vulnerability Management

Protect Against Targeted Attacks With Security Intelligence...

See how the use of security intelligence services can help organizations to defend against ATPs and targeted attacks in this IDC paper.

Previous 1 3 4 5 6

Recommended for You


US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?