Army couples needed for relationship study » Participants hold the key to improved relationships after deployment DENVER: Judy Davis is an acti... Global Association ISACA reaches 45 years and 115,... » London, UK: In 1969, the first message was sent between computers via ARPANET, the precursor o... Datum Datacentres announces fast growing cloud and... » FARNBOROUGH: Datum Datacentres has announced the official launch of the Datum Cloud Hub, the co-loca... ANIMATRONIC MANNEQUIN TO TEST PROTECTIVE EQUIPMENT » The Ministry of Defence has invested £1.1m in a new state-of-the-art robotic mannequin that will tes... Options upgrades low latency route between Cartere... » New York: Options has announced that it has upgraded the route between the firm’s data center facili... Cloud World Forum examines security, privacy and r... » London: As the adoption of cloud computing continues to grow across the world, security, privacy and... U.S. Air Force selects Cubic for Moroccan P5 Air C... » Cubic Defense Systems, a subsidiary of Cubic Corporation has been awarded a contract valued at more ... Tokenless two-factor authentication defies “Heartb... » London: The existence of Heartbleed, a vulnerability in the OpenSSL open source software, was recent... Advanced application security now standard on Barr... » Basingstoke:  Barracuda Networks, Inc. has announced that it will offer advanced application securit... Check Point provides multiple protections against ... » Check Point has announced that its network security products offer multiple protections against the ...

CLICK HERE TO

Viewpoints Header

   Display #  
1 The evolution of technology platforms: What does this mean for businesses? WIELAND ALGE, VP AND GENERAL MANAGER, EMEA, BARRACUDA NETWORKS
2 How to combat the challenge of information security Robert O’Brien, CEO of MetaCompliance
3 Trends for 2014: Looking at the year ahead JEZ WATSON, MANAGING DIRECTOR, CD AUTOMATION
4 Will the Target fallout shift focus away from compliance? ALLAN CARREY, VICE PRESIDENT, PHISHME
5 Don’t let Snowden Leaks chill cloud adoption CAMPBEL WILLIAMS, GROUP STRATEGY AND MARKETING DIRECTOR, SIX DEGREE GROUP
6 It Can Be Easy Being Green JOHN DAVIES, MANAGING DIRECTOR, TDSi
7 Why CMS Is Breeding Security Vulnerabilities BARRY SHTEIMAN
8 Terror attacks in Nigeria: Another Massacre of School Children By Boko Haram DON OKEREKE, SECURITY ANALYST/CONSULTANT
9 Five lessons we can learn from financial services and compliance DWAYNE MELANCON, CTO, TRIPWIRE
10 Facing Extinction: Is There Any Hope For The Species? CALUM MACLEOD, VICE PRESIDENT OF EMEA, LIEBERMAN SOFTWARE CORPORATION
11 “We all deserve the security that comes from having health coverage that's there for us” MICHELLE OBAMA, FIRST LADY, UNITED STATES OF AMERICA
12 Video security in industry and production, despite Rough Conditions DR MAGNUS EKEROT, CEO, MOBOTIX AG
13 Resolving Extra-judicial Killings, Crimes and Spurious Acquittals in Nigeria DON OKEREKE, SECURITY ANALYST/CONSULTANT
14 Are your assets exposed or covered in the cloud? BY MARK KRAYNAK, SENIOR VICE PRESIDENT, WORLDWIDE MARKETING, IMPERVA
15 Kevin Linsell’s Top IT New Year’s Resolutions for 2014 KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPTS