Your Search returned 9156 results from our White Paper Library

Pan logo badge black kick up0906 150x150

Business Management

Top 10 Zero-Day Exploits of 2015

This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime...

Pan logo badge black kick up0906 150x150

Business Management

First Principles for Network Defenders: A Unified Theory for Security Practioners

In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.

Pan logo badge black kick up0906 150x150

Business Management

Secure Windows XP with Traps

Windows XP end-of-life is a critical threat exposure for XP users. Security was one of the major drivers for Microsoft’s decision to end support for this operating...

Pan logo badge black kick up0906 150x150

Business Management

VM-Series for AWS Hybrid Cloud Deployment Guidelines

This white paper provides guidelines and recommendations addressing common questions that arise during hybrid use case deployments, specifically using the Palo Alto...

Pan logo badge black kick up0906 150x150

Business Management

Traps for Windows Server 2003

Microsoft announced Windows Server 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some...

Hpi3737 150x150

Business Management

Threat Hunting: Open Season on the Adversary

Learn how threat hunting can help your enterprise security team aggressively track and eliminate cyber adversaries from your network as early as possible. To build...

Hpi3737 150x150

Business Management

The Curious Case of Security Analytics

The challenge of overcoming known and unknown networks attacks is taking its toll on security professionals, vexing even the most experienced CISOs today. According...

Pan logo badge black kick up0906 150x150

Business Management

Safely Enable Office 365

Concerns over data leaving the corporate network and opening the network to external threats through unknown collaborators has caused many organizations to take...

Pan logo badge black kick up0906 150x150

Business Management

First Principles for Network Defenders: A Unified Theory for Security Practioners

In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks...

Hpi3737 150x150

Business Management

The Business of Hacking: Business Innovation Meets the Business of Hacking

Discover how the most up to date enterprise security intelligence can help you determine which advanced technologies will be most effective at disrupting the adversaries...

12783785787915916

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?