Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • DDoS attack against Spamhaus was reportedly the largest in history

    A distributed denial-of-service (DDoS) attack of unprecedented scale that targeted an international spam-fighting organization last week ended up causing problems for Internet users around the world, experts say.

  • How cybercriminals and hacktivists use DDoS tools to attack

    Network professionals know that distributed denial-of-service attacks are an ever-growing danger. The recent assault on Twitter is just the latest evidence. Using a mushrooming array of advanced tools, including pay-per-use services and mobile devices, attackers are taking down websites, DNS and email servers, often using these tools to destroy a company's online revenue, customer service and brand reputation. But the technology is only half the story. The thinking that shapes attacks ? an evolving blend of careful planning, probing and improvisation?is often the difference between duds and strikes that leave victims begging for mercy.

  • The worst security muddles (so far) of 2012

    From the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches (think LinkedIn, eHarmony, Elantis, VMWare), security muddles have ruled the first half of 2012.

  • Online black markets and how they work

    The internet is no stranger to crime. From counterfeit and stolen products, to illegal drugs, stolen identities and weapons, nearly anything can be purchased online with a few clicks of the mouse. The online black market not only can be accessed by anyone with an internet connection, but the whole process of ordering illicit goods and services is alarmingly easy and anonymous, with multiple marketplaces to buy or sell anything you want.

  • Sirius CTO: UK businesses must start tapping SME talent

    The time has come for small and medium businesses to get the recognition they deserve, according to Andrew Savory, newly-appointed Chief Technology Officer at open source systems integrator Sirius

  • Five ways you can extend your current storage gear

    Recent flooding in Thailand has affected many hard drive manufacturers, resulting in price hikes for hard drives of as much as 50 to 100 percent. How long this will last is unclear, but in the meantime, you can postpone new purchases of storage gear by implementing these methods to help reduce unnecessary files, reduce the space used on the system, and allow for expansion with existing systems.

  • Seven reasons to consider virtualisation

    Both server virtualisation and desktop virtualisation use a software core called a hypervisor to run multiple operating systems on the same physical server hardware. Each OS is kept separate, with resources dedicated as needed.

  • Researchers reveal the inner workings of big botnets

    Researchers gain access to one of the world's largest spam botnets: and find it's an operation that as organised and crafty as any successful corporation

  • IPv6 has a long way to go

    There's maybe never been a better time to be a network engineer, that is provided you have IPv6 experience.

  • A guide to Network Access Control endpoint security

    One of the main promises of network access control is that you can ensure that endpoint security tools are up to date and that non-compliant machines can be identified or blocked. As regulatory compliance has grown in importance, NAC vendors have reacted by building strong feature sets aimed at endpoint security and compliance. In our NAC testing, we had good, and sometimes great, results across the board when it came to endpoint security.

Featured White Papers

Easy to use with activesync

IT administrators simply need to ensure that the ActiveSync protocol is available and that the mail server is exposed to the internet ? and BlackBerry 10 devices will be able to connect. Download this white paper to discover more...
Download whitepaper

Securing Microsoft Exchange 2010 with VeriSign Authentication Services

This guide from VeriSign Authentication Services will help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Download whitepaper

Liberating the Inbox

This paper focuses on the threat posed by unwanted emails that make it through to the inbox, explains the impact these threats have on organisations, and demonstrates what needs to be done in response to make email safe and productive.
Download whitepaper

Message Warehousing on the Mimecast Storage Grid

Today centralised email data management is a critical requirement for every business. Without it companies lose control over their important electronic business records and valuable information, and cannot effectively meet operational and legislative requirements.
Download whitepaper

E-mail Archiving: Analysing Return on Investment

This white paper highlights some of today's most pressing e-mail management challenges, including bloated inboxes, redundant data storage, excessive backup activity, and lost productivity. The paper explains how an enterprise e-mail archiving solution alleviates these problems while delivering an attractive ROI. With EAS, you can:
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map