Your Search returned 17 results from our Editorial content

Sort By


What does the future look like for women in tech?

We spoke to tech workers to find out what can be done to make the technology sector more inclusive


Research: What are the big concerns for CISOs?

Mike Convertino, CISO at F5 Networks, talks through recent research



Q&A: Diversity holds the key to overcoming the cybersecurity...

Debbie Tunstall, Head of Education Programs at Cyber Security Challenge UK, discusses what can be done to attract more women into cybersecurity roles.



Q&A: Where are organizations failing in global cloud data...

We speak to from Joe Pindar from Gemalto about the 2018 Global Cloud Data Security Study



Advice from a CISO: How to beat the fraudsters

Mike Turner, Chief Information Security Officer at Capgemini shares his perspective


What if we gave non-technical security issues vulnerability...

Which is worse: Pork Explosion and Dirty Cow or Invader and Stutter?

Previous 1

Your Search returned 1 results from our White Paper Library

Sort By
Introduction to Artificial Intelligence for Security Professionals


Introduction to Artificial Intelligence for Security Professionals...

A real-world, practical, and approachable instruction of how anyone in cybersecurity can apply machine learning to the problems they struggle with every...

Recommended for You


Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?