Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Defcon Wi-Fi hack called no threat to enterprise WLANs

    Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless.

  • The 15 worst data security breaches of the 21st century

    Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory. Helping us out are security practitioners from a variety of industries, including more than a dozen members of LinkedIn's Information Security Community, who provided nominations for the list.

  • Will 2012 be the dawn of DNSSEC?

    Will 2012 be the year when retailers, banks and content providers finally bolster their DNS systems with an add-on security measure that prevents website spoofing? That's what advocates of the security measure - dubbed DNSSEC for Domain Name System Security Extensions - are hoping will occur.

  • SSL certificates under fire as hacking incidents pile up

    A year ago nobody could have cared less about certificate authorities (CAs), a dull but critical part of Internet that makes it possible for web servers to authenticate themselves to other computers, including ordinary browsers, using SSL.

  • How iPads are taking enterprise by storm

    As global accounts director at Altus, Michelle Klatt's job is to visit Fortune 500 companies and demonstrate her firm's video management software. When the iPad came out a year ago, she was all over it.

  • White House to address critical Internet upgrade

    The Obama Administration until now it has ignored one of the biggest issues facing the Internet: the rapid depletion of IPv4 Internet addresses and the imminent need for carriers and content providers to adopt IPv6.

  • What to watch at Black Hat and Defcon

    Black Hat Security Conference and Defcon in Las Vegas have become the must-attend annual event for security experts, researchers and hackers. If you're attending, Black Hat 2010 and DefCon, here are the five big topics you can expect to hear about.

  • Facebook: How much is your personal information worth?

    The gargantuan amount of high quality user data on Facebook is causing everyone, from marketers to hackers, to salivate like dogs gazing at a steak. They all want a piece of you.

  • Top 10 Google Apps for business

    Google Apps is growing up. Over the past six months, dozens of developers have built apps to make Google's office wares (Apps, Docs, Gmail, Calendar) more appealing for the enterprise. The following is a selection of these apps. They range from the practical (backups) to the creative (a freebie VPN replacement based on Google Talk). Better still, most of them are free.

  • Making sure of VoIP security

    There are new ways to hack VoIP, but strict vigilance can defeat them.

Featured White Papers

Securing Microsoft Exchange 2010 with VeriSign Authentication Services

This guide from VeriSign Authentication Services will help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Download whitepaper

The business value of trust

Fostering and maintaining customer trust is critical. Find out what IT managers are doing to make customers feel safer and more confident online and, as a result, more likely to buy from you.
Download whitepaper

Security and Trust: The backbone of doing business over the internet

When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number.
Download whitepaper

The Domain Name Industry Brief

As the global registry operator for .com and .net, VeriSign closely monitors the state of the domain name industry through a variety of statistical and analytical research.
Download whitepaper

Securing Critical Information Assets Through Intelligent Data Collection, Expert Monitoring, and Analysis

With the increasing complexity of today?s technology environment and the continued growth of the hacker community, companies are experiencing difficulty in establishing the appropriate levels of security. Many organizations that have invested in the latest hardware and software solutions to contend with this increased threat are finding that strong perimeter security only provides a temporary and fractional fix.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map