Your Search returned 2411 results from our Editorial content

Sort By

SECURITY

​Sydney Airport in first stages of facial recognition trial...

Sydney Airport is in the first stages of trialing ‘couch to gate’ facial recognition technology in conjunction with carrier, Qantas.

SECURITY

It’s time to go back to basics to improve IT security

Tool bloat is exposing organizations to significant cyber and financial risk – which is especially problematic in the wake of GDPR.

   

SECURITY

DDoS attacks are still a danger, even during the lull period...

Memcaching might have gone away but beware the rise of Mirai clones.

SECURITY

Inside story: How Kaspersky Lab is building trust

After the Trump administration banned the use of Kaspersky Lab products, the cyber security vendor has attempted to banish allegations of Russian influence.

   

SECURITY

S5Mark is a 'VPN' that is actually a rootkit in disguise,...

A new rootkit, Zacinlo, that attacks United States users of Windows 10 has re-surfaced. It's hidden inside a "VPN" that promises to secure your PC.

SECURITY

StrongVPN review: A good VPN service for rookies

The newly overhauled StrongVPN is very easy to use and is a great choice for users new to VPN services.

   

SECURITY

1Password 7 for Mac review: Password manager with small...

It’s not an overhaul for what is already a robust and competently designed approach, but the touchups and additions move the product along.

SECURITY

Apple puts privacy and security foremost in iOS 12, macOS...

Several features in the upcoming operating systems make it easier to increase security without pain and offer users greater protection from tracking.

   

SECURITY

Stop treating cyber like a ‘boutique technical issue’: report...

Governments need to treat cybersecurity like “a core national and economic security concern and not a boutique technical issue,” global cyber expert Chris Painter...

SECURITY

What kind of data should companies be looking for on the...

What value can dark web monitoring bring to security teams, and what data should they be looking for?

   
   
Previous 1 3 4 5 241 242

Your Search returned 362 results from our White Paper Library

Sort By
Fortinet

Business Management

Defend Against the Undetected

Learn more about how you can defend against the threats you don’t see with the right solutions in place.


Fortinet

Business Management

Securing Your Network and Application Infrastructure

The risk of a breach is growing rapidly due to more devises and more applications hitting your infrastructure. We asked security experts about their biggest...


Sumo Logic

Business Management

Are Users the Achilles' Heel of Security?

Large enterprises are finally coming to the conclusion that security vendors and their solutions are failing them. Despite the unbelievable growth in enterprise...


Sumo Logic

Business Management

Users Pose Greatest Threat to Enterprise Security

The number and complexity of cyber attacks penetrating today’s enterprises continue to escalate. Malicious actors, increasingly sophisticated tactics,...


BlackBerry

Business Management

The Mobile Enterprise: Is Ease of Use Overriding Security?...

This white paper looks at how security is being sacrificed for ease of use and the top concerns around mobilizing enterprise applications.


IBM

Business Management

Webinar: Malware on Smartphones and Tablets

Mobile devices are a key focus when it comes to IT security. This webinar from IBM looks specifically at Malware and how mobile and tablet devices are...


8 Tips to Stay Ahead Of the Top 2016 Data Protection Trends

Business Management

8 Tips to Stay Ahead Of the Top 2016 Data Protection Trends...

Read this white paper from Veritas for their top 8 tips on how to stay ahead of the 2016 Data Protection trends and maximise your investment.


Veritas

Business Management

8 Tips to Stay Ahead Of the Top 2016 Data Protection Trends...

Read this white paper from Veritas for their top 8 tips on how to stay ahead of the 2016 Data Protection trends and maximise your investment.


Gigamon

Business Management

A Security Delivery Platform Benefits the Entire Organization...

Organisations need a comprehensive, well-integrated security platform that takes into account present and future cybersecurity trends.


Previous 1 3 4 5 36 37

Recommended for You

phil-muncaster

How a Washington crackdown on Huawei could backfire for everyone

Phil Muncaster reports on China and beyond

dan2

5G is over-hyped and expectations need reining in

Dan Swinhoe casts a critical eye on the future

keri-allan

What can we learn from tech initiatives in the Middle East?

Keri Allan looks at the latest trends and technologies

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?