SECURITY

Advice from a CISO: How to beat the fraudsters

Mike Turner, Chief Information Security Officer at Capgemini shares his perspective

STORAGE MANAGEMENT

Why accessing business data is still a struggle

Permanence is about more than just storage. Enterprise data can be digital or it can be permanent, but can it be both?

CYBERCRIME

Everything you need to know about… Cybersecurity

IDG Connect's roundup of the most important industry insight and expertise on cybersecurity.

INTERNET

The internet will be decentralised through edge computing...

Fay Arjomandi, co-founder of mimik discusses how IoT brings computing to the edge

INTERNET

News Roundup: Those Zuckerberg for President headlines just...

A roundup of the weeks technology news including self-driving fridges, AWS re:Invent, and burger emojis.

Cybersecurity giant McAfee puts collaboration at the heart...

Cybersecurity’s first responders pledge to keep battling against the biggest enterprise risks

FINANCE

Should ICOs be regulated?

SEC compliance could be the future of successful ICOs

OPEN SOURCE

Enterprise GitHub projects of the week: Intelligence agency...

We look at some of the Open Source projects that can make your life easier.

VIRTUALIZATION

Hypervisor control: The next phase in the security arms...

Hypervisor-based virtualised application protection tools enhance security, but there may be unintended consequences

NETWORK SECURITY

Five reasons your network security policies aren’t working...

Andrew Lintell of Tufin explains the problem with many network security policies

INTERNET

News Roundup: Uber did another bad thing

A roundup of the week’s tech news including Net Neutrality, John McAfee, and anti-scam bots.

BLOCKCHAIN

How to pick a blockchain

Download chapter 2 from ‘Blockchain for Dummies’ courtesy of Wiley

CLOUD COMPUTING

Why the retreat from the public cloud?

Dhiraj Sehgal from Tintri discusses why not everything belongs in the public cloud

SECURITY

What if we gave non-technical security issues vulnerability...

Which is worse: Pork Explosion and Dirty Cow or Invader and Stutter?

BUSINESS MANAGEMENT

Why you need an effective IP exit strategy

Jon Calvert of ClearViewIP explains the business case for having an effective IP exist strategy

BANDWIDTH MANAGEMENT

How to stop embarrassing enterprise website downtime

Enterprise website glitches and downtime are embarrassing and unprofessional. They can and should be avoided.

1 3 5 187 188

Recommended for You

phil-muncaster

Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond

silhouette

Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?