Your Search returned 231 results from our Editorial content

Sort By

SECURITY

Q&A: A novel ‘token’ approach to do away with passwords...

We catch-up with Mark Leonard, CEO of Secure Clouldlink

PASSWORD MANAGEMENT

InfoShot: Worst passwords of 2017

People still think ‘password’ is a good password.

   

CLOUD COMPUTING SECURITY

Q&A: Where are organizations failing in global cloud data...

We speak to from Joe Pindar from Gemalto about the 2018 Global Cloud Data Security Study

DATA PRIVACY AND SECURITY

Beware the GDPR vapourware

NetApp’s legal head Sheila FitzPatrick on why companies can’t simply buy or outsource their way to GDPR compliance.

   

SECURITY

Why does the cybersecurity message never get through?

Data breaches and software vulnerabilities are hitting record highs but the security message still isn’t getting through

DATA PRIVACY AND SECURITY

GDPR: It's about privacy, not security

A discussion with Sheila FitzPatrick of NetApp about the confusion surrounding the true purpose of GDPR

   

SECURITY

An introduction to AI for security professionals

We interview one of the authors of Cylance’s AI for security professionals and offer the full book for download.

CONTAINERS

Q&A: How do good containers go bad?

Tim Mackey, technology evangelist at Black Duck Software talks security in containers

   

CYBERCRIME

Everything you need to know about… Cybersecurity

IDG Connect's roundup of the most important industry insight and expertise on cybersecurity.

SECURITY

What will be the single biggest security threat of 2018?...

Our annual poll to find out what security professionals think the single biggest security threat of next year will be

   
   
Previous 1 3 4 5 23 24

Your Search returned 4 results from our White Paper Library

Sort By
Akamai

Cloud Computing Security

Distributing Security and Optimization in the Application...

Learn the key challenges and solutions of application delivery, including the importance of performance and security resulting from cloud computing.


2016 Data & Analytics Survey

Statistical Data Analysis

2016 Data & Analytics Survey

Organizations continue to consider and adopt big data technology, and this 2016 Data & Analytics research from IDG Enterprise dives deep into where organizations...


Introduction to Artificial Intelligence for Security Professionals

Security

Introduction to Artificial Intelligence for Security Professionals...

A real-world, practical, and approachable instruction of how anyone in cybersecurity can apply machine learning to the problems they struggle with every...


Recommended for You

dan2

US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future

kathryn-cave

A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?