Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message



Latest Security articles

Case Study: Case study: Everton Football Club

Even great sporting institutions need protection.

Case Study: Case study: Harvey Nichols

Happy shopping - without the dark side on your doorstep.

Know your wireless enemy

Understanding the tools that could be used against your WLAN.

Avoid Wi-Fi 'false positives'

Auto-classification helps avoid wireless red herrings

Case Study: World's largest Wi-Fi network uses Linux

Schools in Victorial get secure access.

The ten-minute guide to wireless security - part one

Part one: secure the wireless access point

Security schemes for handheld devices

There's all sorts of reasons why PC security won't port over.

Case Study: What customers want in this new year (part 1)

Heightened communication, standards, disaster recovery and virtualisation

Stop your notebook getting stolen

Stop computer kleptos with these seven hardware and software tricks.

How to secure unmanaged WiFi clients

Make sure they stick to your policy!

Open source identity management

For anyone who wants to develop their own identity management system.

How to future-proof your network

Keep an eye on the new stuff, but don't dive in too soon...

IT Manager's guide to Provisioning and Identity Management, part 1

Make your life easier with software support.

Case Study: Case study: Maxxium Worldwide

Getting to frips with multi-national, multi-site security.

Case Study: Case study: Security Mailing Services

Rolling out a web content-control system.

How to blend WEP, WPA, and 802.11i

Mix and match Wi-fi security schemes - on the same network!

WiFi's security secret - authentication

Want wireless authentication on-the-cheap?

The ten-minute guide to wireless security - part two

Part two - is encryption security that confusing?

Case Study: hospital locks up wireless access points

Tool guards 250 wireless access points at Carilion Health System.

Case Study: What customers want in this new year (part 2)

Heightened communication, standards, disaster recovery and virtualisation

Virtual privacy, part 2

How to connect to a network remotely, but with security.

Case Study: Government lab goes multi-vendor for Wi-Fi security

Military rolls out its own Wi-Fi solution

Secure mobile phones

Beware the leaks in your smartphones!

Case Study: New York courts find security in IP video

Surveillance is the latest add-on, alongside videoconferencing and IP telephony.

IT Manager's guide to Provisioning and Identity Management, part 2

Use job functions to control access to key systems and resources.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map