Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • DDoS attack against Spamhaus was reportedly the largest in history

    A distributed denial-of-service (DDoS) attack of unprecedented scale that targeted an international spam-fighting organization last week ended up causing problems for Internet users around the world, experts say.

  • The 9 greatest IT security threats

    Hacking has evolved from one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launders

  • Windows Server 2012 - 10 key features for IT pros

    The release of Windows Server 2012 is just around the corner, with the initial code due to be sent to manufacturing this month and general availability coming in September.

  • Streamlined Windows Server 8 offers key benefits

    Windows Server has always been a bit different. It looks like your desktop computer, and includes dozens of features that you have no interest in using.

  • Internet Doomsday March 8 - The truth about DNSChanger viruses

    Heard the one about the FBI shutting down the internet next month?

  • The 15 worst data security breaches of the 21st century

    Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory. Helping us out are security practitioners from a variety of industries, including more than a dozen members of LinkedIn's Information Security Community, who provided nominations for the list.

  • Will 2012 be the dawn of DNSSEC?

    Will 2012 be the year when retailers, banks and content providers finally bolster their DNS systems with an add-on security measure that prevents website spoofing? That's what advocates of the security measure - dubbed DNSSEC for Domain Name System Security Extensions - are hoping will occur.

  • Ten top utilities for managing a small network

    If you have a small network at your business or at home, you need help and lots of it. For your home network, you are by default the network administrator. You may also be the de facto network administrator at work, in addition to the other job titles you could claim. And if you are the acknowledged network administrator, you probably have little or no backup staff.

Featured White Papers

The 5 Reasons to Worry about Your DNS

DNS servers are one of the most critical, yet vulnerable, network infrastructure applications. Because of their exposure to the Internet, they are among the most vulnerable computers that an organisation deploys. This whitepaper explains the top five DNS concerns, providing technical details and background information. It then describes genuinely secure DNS server technology, explaining how it handles these important problems. From denial-of-service attacks to poor performance, issues with your DNS servers effect your ability to do business efficiently. Find out how Genuinely Secure DNS servers from Secure64 addresses these issues.
Download whitepaper

Version 4.0.2xx Release of GuardianOS? New Features

This document is intended to give an overview of the latest feature updates, additions and removals from the newest release of GuardianOS ? v4.0.2xx.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map