Your Search returned 1 results from our Editorial content

Sort By

STATISTICAL DATA ANALYSIS

Ethiopia: From Solomon to Big Data

Today Addis Ababa is the seat of the African union, base for the Economic Commission for Africa and often referred to as "the political capital” of Africa. But looking...

   

Your Search returned 23 results from our White Paper Library

Sort By
Changepoint

Business Management

Doing the Right Projects vs. Doing Projects Right

This high-level view into the state of your business is enterprise portfolio management (EPM) and is the new, first step in corporate planning.


LogRhythm

Business Management

SIEM’s Total Cost of Ownership – Key Considerations

This Frost & Sullivan describes the key factors to include when assessing the Total Cost of Ownership for a SIEM system.


CA Technologies

Business Management

Five Best Practices to Manage and Control Third-Party Risk...

This paper from CA provides five best practices for controlling third-party vendor risks.


BitSight Technologies

Business Management

From Signal to Action: Security Metrics That Drive Business...

Learn how you can effectively measure your company’s risk of a data breach.


BitSight Technologies

Business Management

5 Ways Your Vendor Risk Management Program Leaves You In...

Whether you’ve already begun on your vendor risk management (VRM) program, or are looking for ways to improve what you have in place, this guide offers...


BitSight Technologies

Business Management

Looking From the Outside In: Implementing DataDriven Security...

As Internet threats continue to evolve and emerge, how can companies keep up? Security practitioners need actionable information in order to identify and...


BitSight Technologies

Business Management

Making Risk Management More Effective With Security Ratings...

Leearn how with Security Ratings, you can quantify your security performance and identify specific risks that may be putting you in a compromising position....


Malwarebytes

Business Management

Cybersecurity Needs Attention

Time and money spent on protecting organizations from cyberattacks must be wisely spent


IBM

Business Management

2016 Cost of Data Breach Study

This survey with many stats and figures explores the advantages of Business Continuity Management (BCM) when trying to prevent a data breach. Read what...


Previous 1 3

Recommended for You

keri-allan

Latin America’s push towards digital transformation

Keri Allan looks at the latest trends and technologies

martin-veitch-thumbnail

Meeting Owl brings new wisdom to conferencing

Martin Veitch's inside track on today’s tech trends

phil-muncaster

A rare glimpse inside the Chinese cybercrime underground

Phil Muncaster reports on China and beyond

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?