Your Search returned 57 results from our Editorial content

Sort By

SOFTWARE & WEB DEVELOPMENT

Why Spectre demands more elegantly-coded software

Developing bloated software was almost excusable while processors were forever getting faster. That changed in January.

CYBERCRIME

What should you know to handle a cybersecurity crisis?

How to mitigate cybersecurity risks in the wake of a crisis

   

SECURITY

Why does the cybersecurity message never get through?

Data breaches and software vulnerabilities are hitting record highs but the security message still isn’t getting through

MOBILE SECURITY

How do mobile apps impact security in the Industrial IoT?...

New research from IOActive looks at the rise in vulnerabilities of mobile apps which connect to SCADA systems – we catch up with Jason Larsen to learn more

   

INTERNET

News Roundup: Intel faces Meltdown

A roundup of the week’s technology news including drunk droning, IT fashion, and Tango down.

SECURITY

What will be the single biggest security threat of 2018?...

Our annual poll to find out what security professionals think the single biggest security threat of next year will be

   

SECURITY

What if we gave non-technical security issues vulnerability...

Which is worse: Pork Explosion and Dirty Cow or Invader and Stutter?

SOFTWARE & WEB DEVELOPMENT

Where next for GitHub?

Its 10th birthday sees GitHub at the top of the pile. What about the next 10 years?

   

THREAT AND VULNERABILITY MANAGEMENT

Could WikiLeaks dumping CIA code create the next WannaCry...

Experts weigh in on Hive’s potential to cause damage, and the implications of disclosing the CIA’s hacking code.

THREAT AND VULNERABILITY MANAGEMENT

Why does China spot security vulnerabilities quicker than...

Hackers could have a head start on researching exploits that US firms have not yet caught wind of

   
   
Previous 1 3 4 5 6

Your Search returned 0 results from our White Paper Library

Sort By

Recommended for You

dan2

US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future

kathryn-cave

A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?