Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Who's to blame for 'catastrophic' Heartbleed Bug?

    The Heartbleed Bug, basically a flaw in OpenSSL that would let savvy attackers eavesdrop on Web, e-mail and some VPN communications that use OpenSSL, has sent companies scurrying to patch servers and change digital encryption certificates and users to change their passwords. .

  • AP Twitter hack prompts fresh look at cybersecurity needs

    Getting hacked on Twitter is fast becoming a rite of passage for big corporations, but Tuesday's attack on the Associated Press could be a tipping point and shows that social networks must do more to keep their users safe, security experts said.

  • 12 personal security resolutions for 2013

    Among your typical New Year's resolutions - lose weight, stop smoking, be happier - you should consider making some pledges to better secure your digital life. You might even be healthier if you can prevent the stress of a digital disaster, like malware wiping out your PC, having your online accounts hacked, or becoming a victim of identify theft because of a phishing scam or data theft. With that in mind, here are some security resolutions you should consider for the new year.

  • Securing the Internet of Things

    Some of the world?s most successful IT companies believe that Machine-to-Machine computing, the Internet of Things, will propel them to new heights.

  • Do banks have what it takes to withstand DDoS attacks?

    As with Tuesday's attack on Wells Fargo, distributed denial of service attacks are said to be still crude but effective

  • The worst security muddles (so far) of 2012

    From the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches (think LinkedIn, eHarmony, Elantis, VMWare), security muddles have ruled the first half of 2012.

  • Spammers staying ahead of filters and law enforcement

    When Microsoft slayed the notorious botnet Rustock, which had been sending as much as 40% of all spam worldwide, in March 2011, it forced the volume of spam into a decline from which it has never fully recovered.

  • A $500,000 bet on Internet security

    Longtime cloud security advocate Philippe Courtot believes he has identified the Achilles' heel of cloud security, and he wants to protect it.

  • Are we actively encouraging destructive hacking?

    People seem to think that organising teams of people to hack into systems is a way to bring together the best computer talent to square off against each other. I look at it as a waste of that talent.

  • Internet Explorer silent updates are not a miracle cure

    Microsoft made waves this week by announcing that it plans to implement automatic, silent updates to push the latest version of Internet Explorer. If you were hoping that silent updates will finally nail the coffin on IE6 and IE7, though, don?t hold your breath.

Featured White Papers

Internet Security Threat Report 2013

Threats to online security have grown and evolved considerably in 2012. From the threats of cyber espionage to widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. Download this white paper to see how innovations in data security can help protect your company.
Download whitepaper

Converged threats

This White Paper examines converged threats and highlights the need to choose a joined-up solution crucial to delivering the Converged Threat Protection that can outfox and outflank attacks which have raised the stakes in the field of internet security.
Download whitepaper

Symantec Enterprise Security Framework

For IT security professionals today the pace of change has accelerated dramatically. The current Internet security threat landscape continues to evolve in both volume and complexity of attacks. At the same time, trends such as virtualization, cloud computing and the use of consumer mobile devices raise new issues for security. Meanwhile, slow business growth and tight budgets mean IT security must do more with less.
Download whitepaper

Protect your business with a security and compliance solution for financial services and organizations from IBM

It?s a disaster waiting to happen. At the same time that financial services organizations are becoming more reliant on Web technology to deliver innovative features and services to their customers, hackers are increasingly targeting Web applications. According to a recent IBM Internet Security Systems X-Force® research and development team report, 50.4 percent of all vulnerabilities disclosed so far in 2009 are Web application vulnerabilities. Undetected vulnerabilities in Web applications or Web services can leave organizations at risk of security breaches from external or even internal sources.
Download whitepaper

Moving targets

It?s often said that businesses need to think global. But now an even bigger priority is to think mobile. Because the whole concept of business ? how it?s done, when it?s done, where it?s done ? is changing radically.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map