Please login to Techworld.com
Register for a Techworld Account and enjoy unlimited access to our extensive white paper library and exclusive Enterprise multi-user software trials. Account members can also comment on articles and access best practices guides.
Cloud services, virtualisation, BYOD and social CRM are key factors influencing disaster recovery
The last thing the BlackBerry maker needs is a battle over patents with Mformation
Our manager seeks a way to protect information on a network whose perimeter is blurring in the age of SaaS
At the 2012 London Olympics this summer, hackers will be out in full force
Big Data technology and techniques can considerably enhance IT security professionals in their hunt for threats and systemic weaknesses
Gartner analyst says the future lies in a hybrid physical/virtual security technology
Email spam is waning, but it's getting smarter to keep the money coming in
Vendors hope subscription models - and removing the need to manage and update software and hardware - will be attractive
Windows 8 is a major OS overhaul, but some of the most important additions might be the ones you can't see
The solution to get employees to use security systems and protect vital business data?
The group's victims include the Thai Royal Navy, Harvard, Renault Company and the French Ministry of Defense
The wording of the terms of service for Google Drive seems to suggest Google owns any content you upload
It's all about the small things - geo-tagged photos enabled the FBI to catch an elite hacker
Instead of spending resources on trying to teach employees to be secure, companies should focus on securing the environment and segmenting the network
Could things really be this bad?
Trust is at the heart of security, argues Bruce Schneier in his latest book, 'Liars and Outliers'
Latest version of HTML may revolutionise content delivery, but enterprises need to understand security and other risks
Firewall Experts founder and CEO Cory Flynn runs through 10 online safeguards
Has the US started a cyberwar by admitting that Flame is part of a cyberweapons programme?
A study of IT and business pros finds most are struggling to make sense of the security log data, while one third found it hard to distinguish malware from the rest
Banks have been preparing for the dismantling of the euro for over a year, but are they ready for anything?
Hacking has been around for decades. Today's crimes are often financially-motivated fraud. Here are 10 hacking incidents that made history
With the data centre moving to various cloud configurations, server provisioning will be a concern
Corporate investigator Brandon Gregg looks at how bitcoins and Tor make anonymous black markets tick
Did you know that your office printer could cause some major security headaches? Here's what the threats are