Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Top security threats in 2013: Mobile attacks

    For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?

  • 12 personal security resolutions for 2013

    Among your typical New Year's resolutions - lose weight, stop smoking, be happier - you should consider making some pledges to better secure your digital life. You might even be healthier if you can prevent the stress of a digital disaster, like malware wiping out your PC, having your online accounts hacked, or becoming a victim of identify theft because of a phishing scam or data theft. With that in mind, here are some security resolutions you should consider for the new year.

  • Network virtualisation will lead to security control changes

    Gartner analyst Neil MacDonald's specialty is security, and he not only keeps a close eye on what security vendors are doing, but he's an advocate for change as fundamental network technologies evolve. Virtualisation is having an enormous impact, leading to questions about the role of physical security appliances in a virtual world. MacDonald predicts by 2015, 40% of security controls in the enterprise data center will be virtualised, up from 5% in 2010. In a recent interview, MacDonald talked about the future of security in the virtual world.

  • Mobile device management - Tools and technologies for the BYOD era

    Mobile Device Management (MDM) is an increasingly important IT management discipline, particularly with the rise in mobile working and the Bring Your Own Device (BYOD) phenomenon.

  • Next-generation server virtualisation

    Virtualisation has swept the enterprise and its success has driven new innovation in hardware, software and security practices, as IT organisations demand greater performance, manageability and security from their virtualised infrastructure.

  • Five free Android security apps tried and tested

    There's been much controversy over mobile OS security, especially where Android is concerned. With 47% of the smartphone market in Q4 of 2011, according to ABI Research, it's no wonder that Android is getting attention.

  • Know your Internet bad guys

    Anyone who makes a habit of wandering around in cyberspace should print this TrendLabs infographic, posted Wednesday, and keep it close at hand. This colorful web poster contains info on Internet bad guys, and helps people avoid getting scammed, hacked, or hurt by malware.

  • Security in the Apple iCloud

    Memo to IT departments that were caught flat-footed when people started bringing their iPhones to work: You'd better get ready for the iCloud.

  • Desktop virtualisation: How to succeed

    If you've already virtualised the servers in your data centre, desktop virtualisation may seem like the next logical step. But businesses are finding that the benefits of hosted virtual desktop technologies are more nuanced. The advantages may be harder to quantify and harder to justify based purely on traditional ROI calculations.

  • Android is not less secure than iPhone

    One can only hope that security software provider Trend Micro saw a nice sales boost after the proclamation of its chairman earlier this week that Android phones are more vulnerable to hacking than iPhones are. If it didn't, those blatantly self-serving statements were made for nothing.

Featured White Papers

Lower Security Risks and Costs

This paper outlines Trend Micro's Enterprise Security strategy using integrated web, email and file reputation databases.
Download whitepaper

Power to the People? Managing Techonology Democracy in the Workplace

Download this report to find the results of a recent Economist/Trend Micro Survey on how tools such as wikis, social networking and blogs are transforming the workplace.
Download whitepaper

Cisco ASA 5500 Series Anti-X Edition

Learn how you can benefit from the Cisco/Trend Micro partnership! Download this informative, eye-opening white paper to learn how these industry-leading pioneers are working together to consolidate security with the network infrastructure and deliver integrated, innovative technologies that are sure to make a positive effect on the profitability of your business.
Download whitepaper

The Spyware Battle: Privacy vs. Profits

For the past three years, antivirus vendors have toiled over how to handle the removal of spyware ? software that logs information on user activity, collects Web browsing histories, on-line purchases, etc. Spyware programs run in the background, with their activities transparent to most users. Such technology is often utilized by advertisers to trigger pop-up ads that target a Web user?s known profile based on their prior Web searches, browsing, on-line purchases and other information gathered. When utilized by companies for these purposes, the terms ?grayware? or adware are often used because, though it is not wanted, it is also not inherently malicious as some spyware can be.
Download whitepaper

Vulnerability exploits break records

Once measured in months, exploits can now appear within days of a vulnerability announcement.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map