Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Six free network vulnerability scanners

    Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritised list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process.

  • Google Nexus 4 vs. Apple iPhone 5: A head-to-head comparison

    Google's new Nexus 4 officially goes on sale in Australia next week. Announced late last month, the Nexus 4 is manufactured by LG and features a 4.7in IPS screen, a 1.5GHz quad-core processor and has an 8-megapixel camera with a new 360 degree panorama feature.

  • Dell Latitude 10 - Hands on with company's first Windows 8 tablet

    We got our first look at at Dell's Windows 8 line-up, including the Latitude 10 tablet, at a briefing in central London yesterday morning.

  • Securing your hybrid cloud

    The debate over public cloud versus private cloud continues to rage within the IT industry. As most organisations take an ad-hoc, evolutionary approach to new technologies, the environment over the next five years is likely to be a mixture of the two.

  • Can Big Data be used to catch network invaders?

    The buzz in security circles about "Big Data" goes something like this: If the enterprise could only unite its security-related event data with a warehouse of business information, it could analyse this Big Data to catch intruders trying to steal sensitive information.

  • Is your business data safe in the cloud?

    It's scary out there in the cloud. Data thieves, hackers, criminals, they're all out there scouring the Internet around the clock for ways to get into your corporate networks so they can steal data from poorly protected businesses.

  • Words of advice from a LulzSec attack survivor

    Security startup Unveillance fell prey to LulzSec. In this interview, founder Karim Hijazi talks about how the hack unfolded and what lessons he sees for companies.

  • Intrusion prevention is losing steam in a virtual machine world

    Intrusion-prevention system (IPS) vendors have not found it easy to recast their appliances for use in the virtual-machine (VM) environment. But now McAfee and Sourcefire claim to have overcome some hurdles, at least with VMware's VM.

  • Private Facebook data is big business

    When a security researcher made personal profile information of more than 170 million Facebook users available to the public on BitTorrent - a peer-to-peer file sharing site - many questioned why he did not attempt to sell that information to an interested party. Names and profile data on that many Facebook users is a potential gold mine of valuable marketing data.

  • Network stress test tools checklist

    Network stress testing tools are not for the underfunded, the underskilled or the faint of heart. Consider them carefully before deciding whether to purchase them or how to use them.

Featured White Papers

12 things effective intrusion prevention systems (IPS) should do

Download this white paper to discover the top 12 things that your intrusion prevention system (IPS) should be able to do in order to ensure effective security. See if your security solution is up to the task of guarding against today?s stealthy threats by reading on now.
Download whitepaper

Anti-Evasion: Why It?s a Critical Component of Intrusion Prevention Systems

Download this white paper to learn why you should consider a next-level intrusion prevention system (IPS) that offers anti-evasion, a data-normalising technique used to uncover and block encoded threats before they set foot onto your network.
Download whitepaper

CISO guide to next generation threats

Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and Web gateways. Read this paper and learn how to regain the upper hand against next-generation attacks.
Download whitepaper

The Evolution of IPS

In the past, IPS was comprised of a dedicated physical layer with dedicated teams protecting a network from intrusion and attack. Today, the IPS strategy is moving toward a software layer integrated into a company?s existing gateway infrastructure and managed by a general security team.
Download whitepaper

Securing the network from inside threats

Spectator is a comprehensive non-intrusive solution, addressing a wide variety of threats from a single console. Only minutes after installation, you can define a baseline security policy, inspect every PC in the network, generate detailed exception reports, remotely repair problems, and take a giant step forward to securing your enterprise network and data, from both inside and out.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map