Your Search returned 1 results from our Editorial content

Sort By

STATISTICAL DATA ANALYSIS

Ethiopia: From Solomon to Big Data

Today Addis Ababa is the seat of the African union, base for the Economic Commission for Africa and often referred to as "the political capital” of Africa. But looking...

   

Your Search returned 23 results from our White Paper Library

Sort By
Changepoint

Business Management

Doing the Right Projects vs. Doing Projects Right

This high-level view into the state of your business is enterprise portfolio management (EPM) and is the new, first step in corporate planning.


LogRhythm

Business Management

SIEM’s Total Cost of Ownership – Key Considerations

This Frost & Sullivan describes the key factors to include when assessing the Total Cost of Ownership for a SIEM system.


CA Technologies

Business Management

Five Best Practices to Manage and Control Third-Party Risk...

This paper from CA provides five best practices for controlling third-party vendor risks.


BitSight Technologies

Business Management

From Signal to Action: Security Metrics That Drive Business...

Learn how you can effectively measure your company’s risk of a data breach.


BitSight Technologies

Business Management

5 Ways Your Vendor Risk Management Program Leaves You In...

Whether you’ve already begun on your vendor risk management (VRM) program, or are looking for ways to improve what you have in place, this guide offers...


BitSight Technologies

Business Management

Looking From the Outside In: Implementing DataDriven Security...

As Internet threats continue to evolve and emerge, how can companies keep up? Security practitioners need actionable information in order to identify and...


BitSight Technologies

Business Management

Making Risk Management More Effective With Security Ratings...

Leearn how with Security Ratings, you can quantify your security performance and identify specific risks that may be putting you in a compromising position....


Malwarebytes

Business Management

Cybersecurity Needs Attention

Time and money spent on protecting organizations from cyberattacks must be wisely spent


IBM

Business Management

2016 Cost of Data Breach Study

This survey with many stats and figures explores the advantages of Business Continuity Management (BCM) when trying to prevent a data breach. Read what...


Previous 1 3

Recommended for You

phil-muncaster

How a Washington crackdown on Huawei could backfire for everyone

Phil Muncaster reports on China and beyond

dan2

5G is over-hyped and expectations need reining in

Dan Swinhoe casts a critical eye on the future

keri-allan

What can we learn from tech initiatives in the Middle East?

Keri Allan looks at the latest trends and technologies

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?