Matin Kaddour (Australia) - Data Loss Prevention within...

All businesses have data they need to maintain and protect, but within governmental institutions, the stakes are generally much higher. With the multitude of security...

Christian Sundell (Finland) - Managing Users and their Entitlements...

The business goal for entitlement management is to have confidence, that a business stakeholder with a single identity only has access to the business resources...

Ali Ahmar (Middle East) - Securing the Mobile Workforce...

How do you protect valuable enterprise data in an age when employees frequently work beyond the reach of traditional data centre security controls? Increasing...

Brandon Faber (South Africa) - South Africa’s "KING III”...

Compared to an 8000 pound, legal gorilla like the Sarbanes-Oxley (SOX) Act, King III comes across as something of a softie in the world of corporate governance....

Pedro Cruz (Brazil) - Could Online Data be the New Black?...

Looking back at the history of offline marketing, we can see real parallels to what is happening today in the online world. The growth of direct marketing in the...

Sid Probstein (USA) - Unified Information Access (UIA) -...

When speaking about "connecting the dots" one is often assumed to be addressing the challenge of analyzing intelligence data ... sitting in a dark room, deep underground,...

Omar Alvi (Dubai) - Data masking: Safeguard against Internal...

Having sensitive data within an organization is a norm. Whether it is trade secrets, intellectual property, critical business information, business partners’ information,...

Denis Zenkin (Russia) - Intranet Security: Tears in Rain...

There is a common problem in many organizations’ approach to intranet security - they treat intranets as an internal tool hidden deep in the corporate network and...

Louis Leahy (Australia) - Authentication for the 21st Century...

So, how to fix the problem? Well former most is that the authentication should reside on the network with appropriate commercial grade security in place. Parts of...

Rajesh Ranjan (India) - Software as a Service

The global economy has seen many ups and downs recently. This uncertainty has impacted how business decisions are made, especially in case of IT spending. According...

Paul Ruinaard (South Africa) - The Mobile Content Delivery...

We are witnessing spectacular growth in the mobile services space. As smart phones rapidly become next-generation mobile computing platforms, they are driving data...

Leonardo Castro (Mexico) - Cybercrime: Truth or Myth?

Latin America has become a very active region for cybercriminals. Not only are Latin Americans more exposed to online attacks, but weak government regulations and...

Dennis Korevitski (USA) - Let's Cancel all IT Projects

To clarify, I’m not talking about IT infrastructure projects – these should continue. Hardware ages and should be replaced, security can always be tightened, and...

Dennis Oommen (Dubai) - Can IT Security in the Middle East...

The robustness of IT in the Middle East has been a welcome silver lining for many global IT vendors. IT Security, in particular has witnessed some of the highest...

Emma J Webb-Hobson (UK) - Cloud: The Death of Email

As teenagers enter the work force, they will bring their methods for communicating with them. People will be constantly connected, all day every day. The lines between...

Harry Hare (Kenya) - Mobile Applications Development

From mobile banking, SMS chatting to stock market updates and sharing photos through mobile phones, the catalogue of mobile applications in Africa seems to be growing...

1 2 184 186 188

Recommended for You

phil-muncaster

Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond

silhouette

Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?