Your Search returned 1551 results from our White Paper Library

Sort By
Neustar

Security

It's Time to Strengthen Your DDoS Defense Against Cyber...

In the webcast, Barrett shares practical tips illustrated with insights from new global research by Neustar - the security leader in DDoS mitigation.


8x8

Unified Communications

Powering the Workplace of the Future

Those are among the findings of a new Spiceworks survey of IT decision makers exploring their communications needs and their plans for unified communications...


IDG Connect

Security

RiskIQ Case Study

This case study outlines the thought leadership and demand generation program IDG Connect undertook on behalf of RiskIQ.


Malwarebytes

Security

Cybercrime Tactics and Techniques: 2017 State of Malware...

This report looks at the infection tactics, attack methods and the changing distribution techniques that have been observed over the last 12 months.


Malwarebytes

Security

Top 10 Reasons to Make the Move to Malwarebytes (Sophos)...

This infographic outlines ten key differences between Malwarebytes Endpoint Protection solution and Sophos’ equivalent offering.


Dell EMC & Intel®

Information Technology Infrastructure Library (ITIL)

Accelerate IT Transformation with Hyperconverged Infrastructure...

This paper focuses specifically on modern technology pillars: how and why software-defined technology in the form of hyperconverged infrastructure (HCI)...


Bronze Drum

Taking Real-Time Data to the Next Level

This hedge fund was able to develop a competitive edge by taking real-time data analysis to the next level to innovate and hone trading strategies. This...


Bronze Drum

eBook: Building a Data Lake on AWS

n this EBook from Bronze Drum Consulting and AWS, you'll learn the benefits of a data lake on AWS; the basics of building a data lake on AWS; and how one...


Malwarebytes

Security

The New Mafia: Gangs and Vigilantes

This guide features a brief review of cybercrime history, the emergence of new participants and the impact on businesses and individuals.


Previous 1 3 4 5 155 156

Recommended for You

dan2

US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future

kathryn-cave

A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?