Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Fedora tips its hat to mobility, cloud, big data

    The latest release of Fedora, nicknamed "Heisenbug," is a step towards making Fedora a player in the mobile arena. Fedora 20 also includes more support for cloud, and this is also the first release that supports cheap, low-power ARM processors as a primary architecture, in addition to Intel and AMD chips.

  • Microsoft Windows 8: an operating system for the enterprise?

    Microsoft has long been the supreme leader of personal computing, with Windows 7 and prior versions of the operating used by more than 1 billion people worldwide. But since Windows 7 came out in 2009, the world has caught tablet fever, and Microsoft now faces a brave new world in which PCs are losing territory to more portable touchscreen devices.

  • The importance of having automated server access controls

    A large number of enterprises have not implemented automated server access controls, exposing themselves to risks ranging from insider fraud and corporate espionage to regulatory compliance issues and even nation-state sponsored attacks, according to a recent report by information security research firm Echelon One and enterprise access management specialist Fox Technologies.

  • Ultimate guide to Windows 7 security

    Learn how to put AppLocker, BitLocker to Go, security accounts, and other key Windows 7 security improvements to good use

  • Bluetooth steps in for US government security

    Bluetooth isn't just for headsets, says Craig Mathias - it has a role to play in securing mobile access for public sector employees in the US

  • The through train to network security

    Alstom Transport's IT security and telecoms director suggests eight ways to succeed in your first year as a network security officer.

  • Making USB drives secure

    Portable USB storage with built-in cryptographic functions can be highly secure, convenient to use, and comprehensively managed.

  • Why Sun and Nokia are behind Java

    Java's portability and big developer community keep it in the frame for future handsets.

  • Microsoft looks to refine security blueprint

    In future it will be policies that define the network's edge - not the device.

  • Mobile data is still too complex

    Users are stumped because devices aren't secure and operators don't get mobile data. That's the word at Gartner's Mobile Summit.

Featured White Papers

Tokens Aren?t Always the Answer

The following sections discuss how identity-based solutions can work alongside or in place of tokens and other strong authentication technologies. We also look at how organizations today are protecting critical data systems, saving money and time, and managing access simply and inexpensively with TNT technologies.
Download whitepaper

Protiva Technical Overview

Abstract With a growing assortment of devices such as cell phones, personal digital assistants (PDAs) and thin clients, access to the Internet and private networks has become pervasive. However, as network access expands exponentially, so do the potential for unauthorized access and the need for enhanced security and personal identity protection. Strong user authentication systems are a strategic component in network security systems and a number of governmental organizations are recommending or requiring that they be used to protect consumers? digital identities.liabilities.
Download whitepaper

Security Solutions to Minimize Risk of Breaches of Personal Information

The California Security Breach Notice Act (formerly Senate Bill 1386) requires any agency, business, or person owning, licensing, or maintaining a computerized database of personal information on California residents to immediately notify the customers if the security of their personal information is breached. This requirement, which became operative on July 1, 2003, has been duplicated by other states and the federal government and applies even if no personal information is stolen.
Download whitepaper

The Secure Access Using Smart Cards Planning Guide

Administrators are increasingly aware of the dangers that result if they rely only on user names and passwords to provide authentication to network resources. Attackers can guess user names, or use such publicly available information as an e-mail address on a business card to identify a user name. When an attacker knows a user name, the only security mechanism that remains is a user?s password.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map