Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message



Latest Security articles

Case Study: What customers want in this new year (part 1)

Heightened communication, standards, disaster recovery and virtualisation

Stop your notebook getting stolen

Stop computer kleptos with these seven hardware and software tricks.

Case Study: Government lab goes multi-vendor for Wi-Fi security

Military rolls out its own Wi-Fi solution

Secure mobile phones

Beware the leaks in your smartphones!

Case Study: New York courts find security in IP video

Surveillance is the latest add-on, alongside videoconferencing and IP telephony.

IT Manager's guide to Provisioning and Identity Management, part 2

Use job functions to control access to key systems and resources.

Keep laptop data secure

Encryption is a basic requirement

Keep sight of the big picture in WLAN security

If you can secure a wired network you are well on the way...

Choose an EAP for your WLAN

More EAPs than you can handle? Here's a guide

Start right in Wi-Fi security

You have the right parts, what do you do?

Outsourcing anti-spam protection

Questions to ask your prospective service provider.

How to choose a firewall 2005

Like buying a new car, it's always tempting to purchase more than you need.

Set up 802.1X in sixty minutes - Part 1

Today - an RADIUS server in half an hour

Virtual privacy, part 2

How to connect to a network remotely, but with security.

Ten steps to secure networking

Moving your defence beyond firewalls and other point solutions.

How to secure unmanaged WiFi clients

Make sure they stick to your policy!

Open source identity management

For anyone who wants to develop their own identity management system.

How to future-proof your network

Keep an eye on the new stuff, but don't dive in too soon...

IT Manager's guide to Provisioning and Identity Management, part 1

Make your life easier with software support.

Protective Layers: Securing Corporate Networks

With so many types of malware stalking the Internet, companies pile on their email defences.

Put tight authentication on your WLAN

802.1X and the EAPs it works with.

Managing a perimeter firewall

It should be routine by now but it is still worth being careful.

A Wi-Fi security parts list

Here's what you need to keep your WLAN tight

Defend against and block spyware

It's not the same as a virus, but it's no less dangerous.

Set up 802.1X in sixty minutes - Part 2

Today - getting clients and access points secure

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map