Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Is rapid detection the new prevention?

    There's a trend underway in the information security field to shift from a prevention mentality--in which organisations try to make the perimeter impenetrable and avoid breaches--to a focus on rapid detection, where they can quickly identify and mitigate threats.

  • With worker retirements looming, IT starts to prepare for a workforce exodus

    With 10,000 U.S. baby boomers turning 65 every day until 2030, the IT industry is among those that must plan how its workforce will be impacted when these employees eventually retire.

  • Why software-defined security is essential in a virtualised environment

    Virtualisation is widely accepted to be the most effective way to improve efficiency and reduce running costs in the data centre. But the issues of security and compliance within a virtualised environment continue to make many enterprise IT managers nervous about the technology.

  • 12 personal security resolutions for 2013

    Among your typical New Year's resolutions - lose weight, stop smoking, be happier - you should consider making some pledges to better secure your digital life. You might even be healthier if you can prevent the stress of a digital disaster, like malware wiping out your PC, having your online accounts hacked, or becoming a victim of identify theft because of a phishing scam or data theft. With that in mind, here are some security resolutions you should consider for the new year.

  • Want a security pro? Get politically incorrect and understand geek culture

    While complaints can be heard far and wide that it's hard to find the right IT security experts to defend the nation's cyberspace, the real problem in hiring security professionals is the roadblocks put up by lawyers and human resources personnel and a complete lack of understanding of geek culture, says security consultant Winn Schwartau.

  • Cloud business benefits seen in engineering, retail, media and logistics

    The business benefits of sourcing platforms, infrastructure or applications via internet-based public services or private enterprise services have been much hyped over recent years. Dubbed cloud computing public and private cloud computing is a major topic in enterprise technology at present. However, there can be no doubt adoption of both types of cloud services has reached the corporate mainstream.

  • How cybercriminals and hacktivists use DDoS tools to attack

    Network professionals know that distributed denial-of-service attacks are an ever-growing danger. The recent assault on Twitter is just the latest evidence. Using a mushrooming array of advanced tools, including pay-per-use services and mobile devices, attackers are taking down websites, DNS and email servers, often using these tools to destroy a company's online revenue, customer service and brand reputation. But the technology is only half the story. The thinking that shapes attacks ? an evolving blend of careful planning, probing and improvisation?is often the difference between duds and strikes that leave victims begging for mercy.

  • Google Bouncer beaten at Black Hat 2012

    Google implemented its Bouncer technology in February for Google Play (formerly Android Market) to check apps submitted by Android developers for any traces of malicious code. This week at the Black Hat Conference in Las Vegas, security firm Trustwave explained how it's possible to circumvent the Google Bouncer security check.

  • Black hat vs white hat - the fight for the London 2012 Olympics

    From small 'lulz' to potential physical threats, this summer's London 2012 Olympics will see a momentous battle between the white and the black hats.

  • Wi-Fi-Blocking wallpaper keeps your signal in and intruders out

    French scientists have created a type of wallpaper that can block Wi-Fi signal, meaning you can boost your network security and redecorate all in one go.

Featured White Papers

The wild world of malware

Threats are continuously evolving but your firewall protection may not. Now is the time to look beyond traditional network security and incorporate protection against malware and exploits that pass through PCs and mobile devices when users browse the Internet, send or receive email and download applications.
Download whitepaper

10 easy steps to secure your small business

Small business networks face the same threats as large enterprise networks. However, they also contend with the challenge of limited budgets for IT expenditures. The role of administering the network in a small business often falls on the business owner or on the default in-house ?techie,? both of whom wear many other hats in the organization and usually do not have the time, resources or expertise to work on complex deployments and administration. Fortunately, the problem of securing a small business network can be addressed by taking advantage of modern network security technologies. The following 10 steps describe the primary challenges facing small network administrators today, and the solutions now available to resolve these challenges.
Download whitepaper

Definitive Guide to Next-Generation Vulnerability Management

Vulnerability management is the single best protection an organisation can implement to reduce its network security risks. It?s more important than any other network security technology because it improves the security posture of all network components ? not just high-profile assets. Download this guide to discover how you can leverage continuous monitoring to mitigate threats and simplify compliance.
Download whitepaper

The rise of the network

British retailers are faced with challenges of operating in a world where technology is everywhere and bandwidth demands have never been higher. Our eBook explores how the high street should adapt to the online threat and looks at how network security, speed and resilience can enhance operational efficiency and customer loyalty. Then measure your network?s performance using our Network Optimiser tool. We?ll not only rate performance, but also give a comparison against our industry benchmark and highlight improvement opportunities.
Download whitepaper

Network protection and UTM buyers guide

Using a Unified Threat Management (UTM) system provides your network with the best of both worlds, with regards to cost savings and ease of use. You can enjoy the highest standards of network security, plus the ability to integrate multiple security capabilities within one platform. Download this buyers guide to assess the available UTMs and help decide which is the right one for your organisations needs.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map