Your Search returned 133 results from our White Paper Library

Security

Adopt DNS Best Practices to Proactively Protect Against Malware

The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are...

Security

Cybercrime by the Numbers

It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70%...

Security

Remote Access Redefined: Managing the Rise of Third-Party Users

IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built...

Security

Protecting Your Network from Malware

Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable...

Security

Enabling Single Sign-On Across All Application Types

Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and efficiency are imperative, necessitating dynamic,...

Security

Why Moats And Castles Belong In The Past

The moat-and-castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. With EAA there is a new...

Security

Is DNS Your Security Achilles Heel?

With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security...

Security

Remote Access and Security Challenges & Opportunities

Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and...

Newakamai 125x100 150x150

Security

8 Steps to Zero Trust

Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application...

Newakamai 125x100 150x150

Security

Ponemon Institute: The Cost of Credential Stuffing

Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet...

12461314

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?