€1bn CONTRACT TO DEVELOP CUTTING EDGE RADAR FOR ... » A €1bn (approximately £800m) contract for the development of a new electronic radar system for the E... Game-changing threat intelligence service combin... » London: Complete cybersecurity service provider, SecureData has today launched SecureData GI (Greate... New cellular certification adds to Opengear’s out-... » Sandy, UT: Opengear has announced the addition of the ACM5504-5-GS-I and the ACM5508-2-GS-I remote m... Zertificon's decade of success » Berlin: On its 10th anniversary, IT-Security specialist Zertificon looks back on a successful decade... KREA enhances network capabilities with Claviste... » KREA, Turkey’s largest e-mail marketing company, has enhanced its network capabilities following a d... Patch Tuesday: Adobe update » Yesterday Adobe published the second update (APSB14-26) of Adobe Flash this month, an out of band re... Templar Executives awarded CESG certification fo... » Cyber security specialist Templar Executives has become one of the first organisations to gain accre... NBCS supports calls for collaboration in fight aga... » “We couldn’t agree more with the recent comments made by Georgina Barnard, TP Crime Reduction & Part... British Personnel return home from campaign in Afg... » The final UK service personnel have left Kandahar Airfield in southern Afghanistan after completing ... ASC Business Group: Adapt quickly to minimise clou... » Organisations embracing cloud-based security management systems will see major benefits but must ada...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Are you planning to build a security platform? STEVE SALINAS, PRODUCT MANAGER, ALERT LOGIC
2 "New Security flaw exposed in Microsoft’s remote desktop" Andy Kemshall, SecurEnvoy
3 Has Islamism truly been tamed in Tunisia? HUSAM DUGHMAN, AUTHOR/POLITICAL ANALYST
4 Message to Americans: "Let's get to work" BARACK OBAMA, PRESIDENT OF THE UNITED STATES OF AMERICA
5 The Rise of Women in Current British Politics and Business LOUIS CLAYTON
6 Lord £2's gaffe Louis Clayton
7 Top Five Tips for Security Behavior Management Programmes SCOTT GREAUX, VICE PRESIDENT, PRODUCTS AND SERVICES, PHISHME
8 After Gmail hacking: conventional password protection is not enough THE EDITORIAL TEAM
9 Countering the cost of compliance EMILY WOJCIK, SENIOR PRODUCT MARKETING MANAGER-INFORMATION MANAGEMENT, COMMVAULT
10 Context hacks into Canon IoT Printer to run Doom PETER RENNISON AND ALLIE ANDREWS
11 A Light Bulb Moment! JAMIE WILSON, EMEA SECURITY MARKETING, NICE
12 Avoiding the pitfalls of cloud storage failure GAVIN MCLAUGHLIN, VICE PRESIDENT, WORLD WIDE MARKETING, X-10
13 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS, ACCESS
14 Desktop Strategy: Why virtualisation is not the (only) answer Kevin Linsell, Head of Service Development, Adapt
15 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS ACCESS