Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

SECURITY

Features

Latest Security articles


Are financial IT systems ready for a Greek euro exit?

Banks have been preparing for the dismantling of the euro for over a year, but are they ready for anything?

10 hacks that made headlines

Hacking has been around for decades. Today's crimes are often financially-motivated fraud. Here are 10 hacking incidents that made history

Security concerns over a data centre in the cloud

With the data centre moving to various cloud configurations, server provisioning will be a concern

Online black markets and how they work

Corporate investigator Brandon Gregg looks at how bitcoins and Tor make anonymous black markets tick

Is your printer a security sore spot?

Did you know that your office printer could cause some major security headaches? Here's what the threats are

Securing your business in the cloud

Fortunately there are checklists to guide CIOs and IT leaders through cloud security issues

Big Data - Big security problem?

Analysts are warning Big Data presents a big threat to your organisation’s security, legal standing and reputation

For a truly private social network, try RetroShare

With a 'friend-to-friend' approach, this free and open source service offers a secure way to chat and share files with only people you trust

IT pros lack confidence about business security

Survey finds staffers unwilling to bet on network security

Security in the cloud - Encryption for the enterprise

Security is always near the top the list of concerns for IT leaders, and will continue to do so as more porous, cloud computing environments become ubiquitous

Is end point security a waste of time?

Trying to lock down every possible device used in the workplace may face a losing battle

What's next for the Digital Economy Act?

The appeal by BT and TalkTalk against the Digital Economy Act has failed, but the fight will continue

Can Big Data be used to catch network invaders?

Big Data brings big hopes about catching stealthy intruders going after sensitive data

Windows 8 security - What's new in latest operating system

Windows 8 is a major OS overhaul, but some of the most important additions might be the ones you can't see

Nudge theory - What data security can learn from politics

The solution to get employees to use security systems and protect vital business data?

Step aside Anonymous, here comes The Unknowns

The group's victims include the Thai Royal Navy, Harvard, Renault Company and the French Ministry of Defense

Should you worry about Google Drive privacy?

The wording of the terms of service for Google Drive seems to suggest Google owns any content you upload

Geotags in a photo of breasts brought down CabinCr3w hacker

It's all about the small things - geo-tagged photos enabled the FBI to catch an elite hacker

The dangers of embedded system security

Experts say embedded device and systems makers are eons behind in secure system design and development maturity

Slow Flashback Trojan response is Apple's "Adobe moment"

"There will soon be a name for Mac users who are not running AV – victims.”

Why small business is a prime target for hackers

Don't hide behind security through obscurity

The importance of having automated server access controls

A large number of enterprises are exposing themselves to risks ranging from insider fraud to corporate espionage and more

Identity theft reporting system needs improvements, say US victims

FTC report outlines identity theft experiences and outlines recommendations

Eye in the sky: How Google's privacy policy is the least of your worries

Advances in robotic drone surveillance threaten to erode our rights

SaaS, Cloud, encryption & you

IT professionals are best placed to identify cloud security issues


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map