Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

SECURITY

Features

Latest Security articles


Google Bouncer beaten at Black Hat 2012

Trustwave to show how it outwitted Google Play defense against Android malware; Stonesoft to air free 'Evader' detection tool

Dealing with key trends during an IT disaster recovery

Cloud services, virtualisation, BYOD and social CRM are key factors influencing disaster recovery

Will RIM survive the patent minefield?

The last thing the BlackBerry maker needs is a battle over patents with Mformation

SaaS worries: Protecting information on a network with blurring perimeters

Our manager seeks a way to protect information on a network whose perimeter is blurring in the age of SaaS

Black hat vs white hat - the fight for the London 2012 Olympics

At the 2012 London Olympics this summer, hackers will be out in full force

Using Big Data to boost IT security

Big Data technology and techniques can considerably enhance IT security professionals in their hunt for threats and systemic weaknesses

Network virtualisation will lead to security control changes

Gartner analyst says the future lies in a hybrid physical/virtual security technology

Spammers staying ahead of filters and law enforcement

Email spam is waning, but it's getting smarter to keep the money coming in

Is cloud-based security really cheaper?

Vendors hope subscription models - and removing the need to manage and update software and hardware - will be attractive

Windows 8 security - What's new in latest operating system

Windows 8 is a major OS overhaul, but some of the most important additions might be the ones you can't see

Nudge theory - What data security can learn from politics

The solution to get employees to use security systems and protect vital business data?

Step aside Anonymous, here comes The Unknowns

The group's victims include the Thai Royal Navy, Harvard, Renault Company and the French Ministry of Defense

Should you worry about Google Drive privacy?

The wording of the terms of service for Google Drive seems to suggest Google owns any content you upload

Blackhat SEOs and managing the Google threat

Many users have 'a relationship of convenience' with Google, but security must be aware of how services identify, track and profile users

Why employees shouldn't be trained for security awareness

Instead of spending resources on trying to teach employees to be secure, companies should focus on securing the environment and segmenting the network

The worst security muddles (so far) of 2012

Could things really be this bad?

The Internet has created 'the largest trust gap' in history, says Bruce Schneier

Trust is at the heart of security, argues Bruce Schneier in his latest book, 'Liars and Outliers'

HTML5 is not a panacea: Magic Software

Latest version of HTML may revolutionise content delivery, but enterprises need to understand security and other risks

LinkedIn breach reminds us to safeguard ourselves online

Firewall Experts founder and CEO Cory Flynn runs through 10 online safeguards

Cybercrime is 'much bigger than al Qaeda' in the US

Has the US started a cyberwar by admitting that Flame is part of a cyberweapons programme?

How security pros are handling data overload

A study of IT and business pros finds most are struggling to make sense of the security log data, while one third found it hard to distinguish malware from the rest

Are financial IT systems ready for a Greek euro exit?

Banks have been preparing for the dismantling of the euro for over a year, but are they ready for anything?

10 hacks that made headlines

Hacking has been around for decades. Today's crimes are often financially-motivated fraud. Here are 10 hacking incidents that made history

Security concerns over a data centre in the cloud

With the data centre moving to various cloud configurations, server provisioning will be a concern

Online black markets and how they work

Corporate investigator Brandon Gregg looks at how bitcoins and Tor make anonymous black markets tick


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map