Your Search returned 13 results from our Editorial content

Sort By
  • Close-button

    Cloud Computing Security

CLOUD COMPUTING SECURITY

The most common causes of cloud data breaches

When data breaches occur in the cloud, many organizations try to pin the blame on the cloud provider, only to find that, really, it’s their own fault

   

CLOUD COMPUTING SECURITY

Q&A: Where are organizations failing in global cloud data...

We speak to from Joe Pindar from Gemalto about the 2018 Global Cloud Data Security Study

CLOUD COMPUTING SECURITY

Five questions to ask your file sync and share vendor

Ilya Fushman, General Partner at Index Ventures, looks at what questions to ask when evaluating sync and share solutions.

   

CLOUD COMPUTING SECURITY

Cloud research: Ransomware, CISOs & new regulations

Cloud research shows confidence is increasing but security barriers persist

CLOUD COMPUTING SECURITY

Top Tips: How to move to the cloud securely

Steps users should take if they are using the cloud and how they can ensure their data is protected

   

CLOUD COMPUTING SECURITY

What Can We Learn From This Week's iCloud Incident?

F5 systems engineer provides his views on the iCloud incident

   

CLOUD COMPUTING SECURITY

Skyhigh Aims For Clouds with Risk Register

Skyhigh Networks CEO Rajiv Gupta wants to help firms de-risk adoption of cloud services

CLOUD COMPUTING

OneLogin CEO Eyes Rival Okta in Cloud Single Sign-On

The San Francisco neighbours are going head to head in competition for the keys to secure access to applications

   
   
Previous 1

Your Search returned 51 results from our White Paper Library

Sort By
  • Close-button

    Cloud Computing Security

Fortinet

Business Management

Defend Against the Undetected

Learn more about how you can defend against the threats you don’t see with the right solutions in place.


Fortinet

Business Management

Securing Your Network and Application Infrastructure

The risk of a breach is growing rapidly due to more devises and more applications hitting your infrastructure. We asked security experts about their biggest...


Sumo Logic

Business Management

Why Choose Multi-Tenant Cloud-Native Services for Machine...

This paper provides clarity on how to choose a cloud analytics platform that helps you realize the benefits of cloud — such as agility, visibility, and...


VMware

Business Management

Five Mobility Trends Making an Impact in the Modern Workplace...

This eBook identifies five mobility trends that are changing the way businesses work and present an opportunity to transform the enterprise.


VMware

Business Management

The New BYOD: 5 Best Practices for a Productive BYOD Program...

This eBook provides five best practices for creating an effective a productive BYOD program within your organization.


Palo Alto Networks

Business Management

VM-Series for AWS Hybrid Cloud Deployment Guidelines

This white paper provides guidelines and recommendations addressing common questions that arise during hybrid use case deployments, specifically using...


Level 3 Communications

Business Management

Safeguarding the Internet: Level 3 Botnet Research Report...

This paper provides an overview of botnets, and how cyber-criminals are using them.


Symantec Corporation

Business Management

Protecting Corporate Information In The Cloud

Find out how to keep data secure while using the cloud.


Okta

Business Management

Directory Integration - An Architecture Overview

For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration...


Fortinet

Business Management

Securing Your Network and Application Infrastructure

This eBook provides a series of articles on how to deal with the threats you and your network face today.


Previous 1 3 4 5 6

Recommended for You

phil-muncaster

How a Washington crackdown on Huawei could backfire for everyone

Phil Muncaster reports on China and beyond

dan2

5G is over-hyped and expectations need reining in

Dan Swinhoe casts a critical eye on the future

keri-allan

What can we learn from tech initiatives in the Middle East?

Keri Allan looks at the latest trends and technologies

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?