Encap Security incorporates convenience of Apple... » Oslo & Palo Alto: Encap Security, the first in-app authentication solution to arm banks, retailers a... HGI announces new direction at BWF 2014 as it lo... » HGI has announced at Broadband World Forum 2014 that it will be taking a new direction as it moves t... Skyguard chosen to protect lone workers » VINCI Facilities, part of VINCI, has adopted Skyguard’s personal safety service to mitigate potentia... Alert Logic launches European Security Operations ... » Recent cases have highlighted that the landscape for cyber threats has increased dramatically over t... Travelex selects A10 Networks for major network an... » UK: A10 Networks has announced that Travelex Group, the world’s leading foreign exchange (FX) specia... Lieberman Software Privilege Management Platform... » London, UK: Lieberman Software Corporation has announced that its adaptive privilege management plat... Driving forward with Tokenization and HCE...new pa... » Driving forward with Tokenization and HCE – New Paper from the Smart Payment Association. In this pa... Research Group discovers vulnerabilities in the Ad... » Check Point has announced that its Security Research Group has discovered vulnerabilities in the Adm... Intamac chosen to develop innovative Cloud Video R... » Vigilance can report that Intamac has been selected by Swann Communications to develop an innovative... Cardinal Group basks in the glory of many accolade... » The Cardinal Group Retail Fraud Awards 2014 Vigilance can report that the Cardinal Group, celebrate...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Lord £2's gaffe Louis Clayton
2 Top Five Tips for Security Behavior Management Programmes SCOTT GREAUX, VICE PRESIDENT, PRODUCTS AND SERVICES, PHISHME
3 After Gmail hacking: conventional password protection is not enough THE EDITORIAL TEAM
4 Countering the cost of compliance EMILY WOJCIK, SENIOR PRODUCT MARKETING MANAGER-INFORMATION MANAGEMENT, COMMVAULT
5 Context hacks into Canon IoT Printer to run Doom PETER RENNISON AND ALLIE ANDREWS
6 A Light Bulb Moment! JAMIE WILSON, EMEA SECURITY MARKETING, NICE
7 Avoiding the pitfalls of cloud storage failure GAVIN MCLAUGHLIN, VICE PRESIDENT, WORLD WIDE MARKETING, X-10
8 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS, ACCESS
9 Desktop Strategy: Why virtualisation is not the (only) answer Kevin Linsell, Head of Service Development, Adapt
10 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS ACCESS
11 Desktop Strategy: Why virtualisation is not the (only) answer KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPT
12 The Past in the Present AYEWOH ITUAH, SECURITY ANALYST/CONSULTANT
13 Genuine Two-Factor Authentication TOYIN ADELAKUN, VICE PRESIDENT, SESTUS
14 The Islamic State Group in a Nutshell HUSAM DUGHMAN, AUTHOR AND POLITICAL SCIENTIST
15 Is £266bn just the tip of the Cybercrime iceberg? MARK SPARSHOTT, EMEA DIRECTOR, PROOFPOINT