Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

SECURITY APPLICATIONS

Topic Zone

Latest News

  • Apple's Mac: the Post-PC PC?

    The Apple Mac, celebrating its 30th birthday today, is an anomaly wrapped in a paradox: the most successful personal computer ever with single-digit market share, from the company reinventing itself as the "post PC" leader, is likely to keep growing in the enterprise, even though Apple's whole approach is consumer focused.

  • Cisco takes fight to SDNs with bold Insieme launch

    Game on: Cisco has acquired spin-in Insieme Networks for $863 million and rolled out a family of its switches that are the network giant's strategic answer to the growing software defined network movement.

  • Open source developers clueless about security disclosure, Rapid7 finds

    Open source developers can be just as clueless at handling third-party security disclosures affecting their products as the often-criticised closed source sector, a researcher for security firm Rapid7 has discovered after spotting exploitable issues in a clutch of popular web apps hosted on SourceForge.

  • Intel to acquire network security firm Sensory Networks

    Intel has signed a deal to acquire Sensory Networks, a provider of software pattern matching technology for network security applications.

  • Cisco-Sourcefire union raises many product overlap questions

    Industry watchers are bullish about the $2.7 billion Cisco buyout of security company Sourcefire announced today, but they have plenty of questions about how these competitors in intrusion-detection and prevention (IDS/IPS) and next-generation firewalls (NGFW) will sort out significant product overlap.

  • Amazon Web Services adds Check Point cloud security

    Check Point and Amazon Web Services are teaming up to offer Check Point Security Gateway cloud security for business assets.

  • Hackers harvest Facebook private data with social bots

    Facebook's fake account detection mechanisms can be defeated 80 percent of the time with the help of automated tools, researchers from the University of British Columbia (UBC) have found after an eight week test.

  • Scientists hide messages using E. Coli bacteria

    Scientists have come up with a novel way to encode biological messages on physical objects using genetically-engineered bacteria that react to light or chemicals to reveal hidden codes.

  • HP launches scorecard application to summarise business metrics

    HP plans to introduce a scorecard application that can visually summarise a wide swath of metrics taken from other HP software, the company announced.

  • CA discovers fake antivirus smartphone app

    The shady but usually profitable world of fake antivirus software has arrived on mobiles with the discovery of a nameless Russian language app that claims its victims? smartphones have become infected with malware.

Latest Features





Featured White Papers

Hanging on the telephone

Download this white paper to find out about how you can determine the difference between ligitmate and fake callers. This useful guide will help you combat the growing problem of telephone fraud and tell you more about the various and ongoing support scams that you need to be aware of.
Download whitepaper

Bridging the network security gap

Enterprises must take a robust policy-driven approach to enforcing security compliance in order to protect against network vulnerabilities and meet regulatory requirements. This paper examines technology and initiatives designed to capitalize on existing investments and prevent any gaps in security.
Download whitepaper

Safeguarding Data Storage

This white paper explains how RAID storage is used in video surveillance and security applications, describes a sample installation, and provides guidelines on determining specific needs.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map