Your Search returned 62 results from our Editorial content

Sort By


Security: Why does Southeast Asia lag behind?

A look at how Southeast Asia is lagging behind in Asia’s cybersecurity posture


Q&A: A novel ‘token’ approach to do away with passwords...

We catch-up with Mark Leonard, CEO of Secure Clouldlink



What CIOs need to know about workplace biometrics

Professor James Woudhuysen takes an in-depth look at what biometrics are out there and what they might mean for tomorrow’s enterprise


Q&A: Where are organizations failing in global cloud data...

We speak to from Joe Pindar from Gemalto about the 2018 Global Cloud Data Security Study



Why does the cybersecurity message never get through?

Data breaches and software vulnerabilities are hitting record highs but the security message still isn’t getting through


Q&A: How do good containers go bad?

Tim Mackey, technology evangelist at Black Duck Software talks security in containers



Everything you need to know about… Cybersecurity

IDG Connect's roundup of the most important industry insight and expertise on cybersecurity.


What will be the single biggest security threat of 2018?...

Our annual poll to find out what security professionals think the single biggest security threat of next year will be



Hypervisor control: The next phase in the security arms...

Hypervisor-based virtualised application protection tools enhance security, but there may be unintended consequences


What if we gave non-technical security issues vulnerability...

Which is worse: Pork Explosion and Dirty Cow or Invader and Stutter?

Previous 1 3 4 5 6 7

Your Search returned 2 results from our White Paper Library

Sort By
2017 IDG Enterprise Security Priorities Survey


2017 IDG Enterprise Security Priorities Survey

The 2017 IDG Enterprise Security Priorities study provides insight into the security roles and technologies that help mitigate risk and allow for business...

Introduction to Artificial Intelligence for Security Professionals


Introduction to Artificial Intelligence for Security Professionals...

A real-world, practical, and approachable instruction of how anyone in cybersecurity can apply machine learning to the problems they struggle with every...

Recommended for You


Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?