VIRTUALIZATION

Hypervisor control: The next phase in the security arms...

Hypervisor-based virtualised application protection tools enhance security, but there may be unintended consequences

NETWORK SECURITY

Five reasons your network security policies aren’t working...

Andrew Lintell of Tufin explains the problem with many network security policies

INTERNET

News Roundup: Uber did another bad thing

A roundup of the week’s tech news including Net Neutrality, John McAfee, and anti-scam bots.

BLOCKCHAIN

How to pick a blockchain

Download chapter 2 from ‘Blockchain for Dummies’ courtesy of Wiley

CLOUD COMPUTING

Why the retreat from the public cloud?

Dhiraj Sehgal from Tintri discusses why not everything belongs in the public cloud

SECURITY

What if we gave non-technical security issues vulnerability...

Which is worse: Pork Explosion and Dirty Cow or Invader and Stutter?

BUSINESS MANAGEMENT

Why you need an effective IP exit strategy

Jon Calvert of ClearViewIP explains the business case for having an effective IP exist strategy

BANDWIDTH MANAGEMENT

How to stop embarrassing enterprise website downtime

Enterprise website glitches and downtime are embarrassing and unprofessional. They can and should be avoided.

THREAT AND VULNERABILITY MANAGEMENT

Could WikiLeaks dumping CIA code create the next WannaCry...

Experts weigh in on Hive’s potential to cause damage, and the implications of disclosing the CIA’s hacking code.

BLOCKCHAIN

Discover ten top blockchain projects

Download chapter 19 from ‘Blockchain for Dummies’ courtesy of Wiley

CHANGE MANAGEMENT

South Africa: 60 years of tech but what’s really changed?...

Adrian Schofield discusses how despite all the changes tech has brought, many things still stay the same

SOFTWARE

CA CEO: On innovation, playing it safe is the riskiest thing...

CA chief exec Mike Gregoire outlines his vision for how companies should embrace software-driven innovation.

BUSINESS MANAGEMENT

Seven Chinese world leaders may point to the future of tech...

Dr. Johnny Hon discusses the global rise of Chinese tech companies

ENCRYPTION

How quantum cryptography will soon be shaping online security...

Neil Bramley from Toshiba discusses the role quantum computing will play in future security

TRAINING AND DEVELOPMENT

What is the true value of IT apprenticeships?

Despite disappointing apprenticeship numbers, learning on the job is a valid route into IT – right up to the top.

ARTIFICIAL INTELLIGENCE

Graphs, AI and recommendations 2.0

Graph database pioneer Emil Eifrem discusses how graphs are at the root of the increasingly widespread phenomenon of applied AI

Previous 1 2 4 5 185 186

Recommended for You

phil-muncaster

Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond

silhouette

Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?