Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Who's to blame for 'catastrophic' Heartbleed Bug?

    The Heartbleed Bug, basically a flaw in OpenSSL that would let savvy attackers eavesdrop on Web, e-mail and some VPN communications that use OpenSSL, has sent companies scurrying to patch servers and change digital encryption certificates and users to change their passwords. .

  • Identity theft reporting system needs improvements, say US victims

    Unwanted pressure to buy protection services from credit reporting agencies and the inability to speak to a live person when reporting an identity theft situation were the two most annoying issues victims identified in a Federal Trade Commission report issued on the growing problem this week.

  • LulzSec bust a blow to Anonymous? Not so fast

    Security experts say it's too early to tell how much damage has been done to the hacking groups that operate under the loose affiliation of Anonymous.

  • The 15 worst data security breaches of the 21st century

    Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory. Helping us out are security practitioners from a variety of industries, including more than a dozen members of LinkedIn's Information Security Community, who provided nominations for the list.

  • Protecting your organisation's intellectual property

    Global healthcare provider Best Doctors employs the most robust technologies and practices available to protect the privacy of its members' personal data - but that's just a part of doing business in this industry. Less obvious but equally important is the degree of vigilance with which the company protects its brand name, which is trademarked in dozens of countries worldwide.

  • The worst Internet privacy scandals of all time

    In honour of National Data Privacy Day, we've put together a list of the 15 worst Internet privacy scandals of all time.

  • Online shoe retailer Zappos hacked: What we can learn from this - the online source for shoes - was the victim of an attack that compromised account information for millions of customers. Zappos customers need to understand what is at stake, and be on alert for suspicious or malicious activity resulting from the attack.

  • Why law enforcement can't stop hackers

    On July 19, 2011, FBI agents in nine states rounded up 14 men and two women ranging in age from 21 to 36 for their alleged involvement with the international hacking group Anonymous. Fourteen of these individuals were arrested for allegedly plotting and executing a distributed denial of service (DDoS) attack in December 2010 that took down the PayPal website.

  • Cyber risk and the future of national response

    In September 2007, in a remote laboratory in Idaho, researchers began to show that the security picture had begun to change, dramatically and irreversibly.

  • Facebook bows to stricter German culture

    Facebook's willingness to agree to a voluntary code of conduct in Germany to protect users' data shows it is mindful of how the culture there contrasts with that in the US.

Featured White Papers

Security and Trust: The backbone of doing business over the internet

When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number.
Download whitepaper

Web Threat Protection: Challenges and Solutions

Web threats often use multiple protocols in their attack. To combat these threats businesses must look to a multi-layered, comprehensive set of techniques. Employ a new approach to ensure security, regulatory compliance, and business continuity.
Download whitepaper

Getting in front of change

It's the call no CIO wants to receive. A corporate computer has been stolen ? a PC from a branch office or a portable from a train station or airport. Suddenly, it?s time to go into crisis mode to migrate even the smallest possibility of a security breach. After all speed is of the essence when dealing with the potential for identity theft or data privacy violations.
Download whitepaper

Meeting the PCI Standard

Identity theft and credit card fraud is a large and growing problem. The Federal Trade Commission estimates that almost 10 million consumers were affected last year, at a cost of close to $50 billion. In order to combat this growing menace, Visa, MasterCard, American Express, Diners Club, Discover and other major credit card providers joined together to introduce the Payment Card Industry (PCI) Data Security Standard. This program is intended to protect cardholder data wherever it resides, ensuring that members, merchants and service providers maintain the highest levels ofinformation security. This white paper describes the PCI Data Security Standard and provides an explanation of how change control can be leveraged to comply with its requirements at a greatly reduced cost.
Download whitepaper

Phishing Detection and Prevention

This paper will detail the technical aspects of typical phishing campaigns, focusing on the tactics, methodology, and unique features of the phishing e-mail and the phishing Web site. It will outline how automated, inline network-based solutions, built on existing intrusion prevention technology, can be leveraged to assist network defenders protect their constituencies from online fraud.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map