Your Search returned 2370 results from our Editorial content

Sort By

CYBERCRIME

Everything you need to know about… Cybersecurity

IDG Connect's roundup of the most important industry insight and expertise on cybersecurity.

SECURITY

Mingis on Tech: Lessons from RSA 2018

This year's RSA security conference focused on a variety of cybersecurity topics – everything from blockchain to the looming GDPR rules. CSO's Steve Ragan was there...

   

SECURITY

What you need to know before you launch a bug bounty program...

What you should know about launching your own bug bounty programs

SECURITY

Who are today’s ethical hackers?

The who, where, and why of today’s ethical hacking armies.

   

SECURITY

Why more and more companies are turning to bug bounties...

Where once companies gave out branded swag or lawsuits, ethical hackers are now making small fortunes and helping companies be more secure.

SECURITY

Trend Micro Antivirus for Mac review: Solid malware prevention...

Trend Micro Antivirus has a solid set of features and performs very well in malware detection and blocking, including intercepting some kinds of ransomware.

   

SOCIAL NETWORKS

News Roundup: Zuckerberg under the spotlight in Congress...

A roundup of the week’s technology news including AR glasses sales, Norway as a ‘datacenter nation’, and politicians hacking politicians.

SECURITY

ZenMate VPN review: This simple VPN clears your mind of...

ZenMate VPN from ZenGuard is very easy to use and offers enough country locations and speeds to satisfy most users.

   

SECURITY

Reputational risk and social media: When you're blocked...

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against...

SECURITY

Ivacy VPN review: A competent VPN that doesn't mind cryptocurrencies...

Ivacy offers average speeds, a cleanly designed app, and a few helpful features like split tunneling, but it's also a company that doesn't want to reveal who's running...

   
   
Previous 1 3 4 5 236 237

Your Search returned 918 results from our White Paper Library

Sort By
Meru Networks

WLAN

Security: Multiple Lines of Defense

To understand the unique vulnerabilities of wireless networks, it is necessary to analyze threats from the enterprise perspective. Wireless security vulnerabilities...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Oracle

Database Solutions

Preventing Enterprise Data Leaks

Discuss the growing internal threats to business information and know more about the impact of government regulations on the protection of data. Check...


Oracle

Budgeting, Planning & Forecasting

Protection against Internal and External Threats

Is your midsized organization facing insecurity for the sake of platform consistency? Stop! With the right multi-level data protection against a wide range...


Oracle

Regulatory Compliance

Make Compliance Work For You

Discover the five important steps to build embedded compliance architecture. Read on to learn how to deliver the best possible value for your IT budget...


Imperva

Security

SecureSphere Data Security Suite

This is the latest Technology Audit by Ovum Butler. View why Imperva's SecureSphere solution merits a closer evaluation by any organization keen on building...


Imperva

Security

State of Web Application Security

Ponemon Institute conducted this study to better understand the risk of insecure websites and how organizations’ are addressing internal and external threats.1...


Previous 1 3 4 5 91 92

Recommended for You

phil-muncaster

How a Washington crackdown on Huawei could backfire for everyone

Phil Muncaster reports on China and beyond

dan2

5G is over-hyped and expectations need reining in

Dan Swinhoe casts a critical eye on the future

keri-allan

What can we learn from tech initiatives in the Middle East?

Keri Allan looks at the latest trends and technologies

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?