Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • 12 personal security resolutions for 2013

    Among your typical New Year's resolutions - lose weight, stop smoking, be happier - you should consider making some pledges to better secure your digital life. You might even be healthier if you can prevent the stress of a digital disaster, like malware wiping out your PC, having your online accounts hacked, or becoming a victim of identify theft because of a phishing scam or data theft. With that in mind, here are some security resolutions you should consider for the new year.

  • Defcon Wi-Fi hack called no threat to enterprise WLANs

    Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless.

  • The 5 coolest things to come out of CES

    Anyone who's attended tech conventions over the past five years has heard plenty about 4G wireless networks, but this year the hype has become a reality.

  • Best free WiFi security tools

    WiFi security has come a long way from the days when consumers used wireless routers with inadequate or no encryption, and overlooked the need to change default passwords for gateway access.

  • Despite Google Street Car incident, WiFi data collection continues

    Four months ago, amidst a backlash from government regulators and privacy advocates, Google stopped collecting WiFi data with its Street View cars. But that doesn't mean Google has stopped collecting wireless data altogether, and neither have other companies such as Apple.

  • The lowdown on the Techworld product awards

    We're often asked why certain products won an award - or why others didn't. We don't want the judges' decision to be shrouded in secrecy so this year we're setting out why the winners triumphed.

  • 12 top mobile and wireless issues for 2008: Part 1

    There's a bumper year ahead, says Craig Mathias.

  • Performance is part of the Wi-Fi puzzle

    AirMagnet's Chia Chee Kuan tells us why wireless performance is as important as security - especially with fast, complex 802.11n waiting in the wings.

  • Replacing WEP has become an urgent priority

    The old wireless security standard was broken years ago, but some people have had to keep using it because of their equipment. Now is the time to change that.

  • Time to sell wireless security as a service?

    Wireless security has been mis-sold, says David King, of Airtight networks. It's essential to protect wired networks, and it has to be provided as a service.

Featured White Papers

When corporate network safety starts at employees' homes

A step-by-step guide to protecting your network against home wireless hackers and educating employees on the safe use of wireless home networks.
Download whitepaper

Securing the Wired and Wireless Network

Identifying business requirements for network security and acting on them.
Download whitepaper

Integrity of Information on the Move with the Cisco Secure Wireless Solution

The growth of wireless networking has blurred the traditional boundaries between trusted and untrusted networks and shifted security priorities from the network perimeter to information security. The need to secure mobile information and control the wireless environment to prevent unauthorized access must be a priority for maintaining the integrity of corporate information and systems.
Download whitepaper

Best Practices for Outdoor Wireless Security

While the idea of a network being physically outside the confines of a building may raise concerns about security, IT administrators can rest assured that with proper measures, outdoor wireless networks can be just as secure as indoor wired and wireless LANs.
Download whitepaper

Integrity of Information on the Move with the Cisco Secure Wireless Solution

As a basis for any wireless security strategy, IT should focus on protecting sensitive customer, partner, and financial information. The digitalization of information and the ubiquity of IP communications have improved productivity and business processes by making access to information immediate.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map