Follow Us

Search all Blogs

Recent Posts.

Google's Project Zero flaw programme - do-gooding spin or a much-needed evolution?

It turns out that flaw bounties won't do it on their own. Google is the first to realise this. Germany had its post-WW2 Year Zero, New York has Ground Zero and now Google has added its name to the list...

RSSSubscribe to this blog

Google adopts plain English for new Chrome browser warnings

The smallest changes are sometimes the best ones Google is preparing a small but important tweak to the malware warnings thrown up when Chrome encounters a page blacklisted by Safe Browsing security, the firm has sneaked out in a Twitter...

RSSSubscribe to this blog

If Brian Krebs is this hated he must be doing some good

Journalists are supposed to report cybercrime. Now one of them is regularly on the receiving end. Security journalists are normally pretty much ignored by cyber-criminals but  campaigning security blogger Brian Krebs seems to have got under the skin of one...

RSSSubscribe to this blog

The importance of being digital inside and out

As businesses start to recognise that mobile, cloud, social media, virtualisation and big data are more than buzz words and hot topics, it is now the time to adopt work processes that leverage digital technologies to add business value. However,...

Tags: accenture, analytics, applications, bpm, collaboration, crm, gamification, mobile, wearables, workflow

RSSSubscribe to this blog

Why IT monitoring is dominating spending priorities

Monitoring IT networks, systems and devices is the top spending priority of IT managers for 2014, according to a new report. Some 58% of IT managers will invest their budgets in monitoring this year, the results show. Over 550 IT...

RSSSubscribe to this blog

The Syrian Electronic Army is quieter but still out there

Paradoxically, the SEA's attacks 'micro-hacks' against the Sunday Times and The Sun this week suggest that defences are improving So often bitten in the past, website owners appear to be getting to grips with once-feared Syrian Electronic Army (SEA) after...

RSSSubscribe to this blog

Cybercrime costs $445 billion a year but that might be the least of it

In a world where governments ape the behaviour of cybercriminals, costs estimates risk missing the point. Cybercrime cost the global economy a staggering-sounding $445 billion in economic losses in 2013, a McAfee-sponsored report from the Center for Stategic and International...

RSSSubscribe to this blog

The thing is with ... other people

“We’re off to the Cinema…” my then teenage girlfriend at the time shouted to her Father. “…which way are you going?” boomed the dreaded reply from the living room. As a professional driver, his only method of interaction ensured we...

RSSSubscribe to this blog

Gameover Zeus - the sudden unmasking of cybercrime's most wanted

The age of criminal impunity might finally be coming to an end Discount yesterday’s dramatic disruption of the Gameover Zeus botnet and CryptoLocker ransom malware, the real story is that the FBI has decided to name the Russian man, Evgeniy...

RSSSubscribe to this blog

Data breaches aren't about credit cards or passwords. What is at risk here are people's identities

Target, eBay and now Office. Why don't more sites use public key encryption systems like OneID? “Unfortunately we have been the subject of a security breach resulting in unauthorised access to your account,” read the email the British shoe...

RSSSubscribe to this blog

Recent Comments

Powered by Disqus

Techworld White Papers

Optimising data protection for virtual environments

VM environments require the same level of data protection as does the physical server environment. Companies may use data protection tools built for the physical environment in the virtual world, but this has serious disadvantages.

Download Whitepaper

PCI Compliance: Are UK businesses ready?

Exploring the results of a recent survey, including: ? Levels of understanding of the standard ? Current perceptions of actual compliance status ? Attitudes toward addressing compliance

Download Whitepaper

Mobility Management for Dummies

Your complete guide to managing and securing mobile devices such as laptops and smartphones.

Download Whitepaper

Magic Quadrant for midrange and high-end NAS solutions

It is difficult to find one midrange or high-end NAS product that can cater to all needs. File systems embedded in NAS are often designed to solve one major pain point, with additional features being added later to broaden use cases and benefits.

Download Whitepaper

Techworld UK - Technology - Business

Oracle Video

Enabling agile and intelligent businesses

 Changing markets, competitive pressures and evolving customer needs are placing increasing pressure on IT to deliver greater flexibility and speed. Explore truly flexible SOA foundations with this Oracle video.

COLT White Paper

IT Misuse Survey

Complete this survey and you could win a Nexus One

Techworld are running a short survey to discover how UK businesses are managing Internet and email misuse in the Enterprise.

Complete Survey

Complete our survey and you could win a Sony E-book Reader.
Techworld have teamed up with HP to compile a survey relating to server virtualisation. Complete the short survey and you could be the lucky winner of a Sony E-book reader.

Complete the survey here

Site Map