The U.S. and Cuba » The White House, Washington Yesterday, after more than 50 years, we began to change America's rela... Why is an integrated network health solution criti... » Networks have become a strategic business asset that glues together the data, the applications, and ... Nuix joins McAfee security Innovation Alliance P... » LONDON, UK: Nuix has joined the McAfee Security Innovation Alliance program. Nuix and McAfee are now... IGEL updates Windows Embedded firmware and expands... » Reading, UK: IGEL Technology has updated its firmware for its Windows Embedded Standard 7 thin clien... ForgeRock reveals 2015 technology predictions » Bristol: ForgeRock Inc. has revealed its 2015 technology predictions. The company expects to see inc... Lancope unveils newly enhanced, world-Class cust... » Company has increased its investment in customer success by 150 percent this year LONDON UK: Lanco... ANNUAL ARMED FORCES COVENANT REPORT PUBLISHED » THE Armed Forces Covenant Annual Report has been presented to Parliament today and details the progr... Opengear Continues EMEA Momentum » Slough UK:  Opengear has announced its most impressive year in EMEA with across the board growth. 2... America and Boko Haram: Challenges and Responses ... » IN PRAISE OF SELF-RELIANCE Obama's America...not a friend in need, hence not a friend inde... Military training set to be improved with trees » Soldiers using Catterick Training Area (CTA) are set to benefit from improved facilities thanks to t...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Is Cloud Security an Oxymoron? GILAD PARANN-NISSANY, CO-FOUNDER AND CEO, PORTICO
2 How to handle the security problem with big data GUILLERMO LAFUENTE, SECURITY CONSULTANT, MWR, INFOSECUIRTY
3 The Internet of Things (IoT) Will Fail if Security Has No Context Neil Chapman SVP & MD EMEA and International, ForgeRock
4 Next-Gen Network Monitoring: The Missing Piece of the Security Puzzle JESSE ROTHSTEIN, CEO AND CO-FOUNDER, EXTRAHOP NETWORKS
5 Is Turkey a successful Islamist model? HUSAM DUGHMAN
6 What is Point-Of-Sale (POS) Malware: The Top 10 most prolific POS malware families BRANDON TANSEY, SECURITY RESEARCHER. LANCOPE
7 Next-Gen Network Monitoring: The Missing Piece of the Security Puzzle Jesse Rothstein, CEO and co-founder of ExtraHop Networks
8 Are you planning to build a security platform? STEVE SALINAS, PRODUCT MANAGER, ALERT LOGIC
9 "New Security flaw exposed in Microsoft’s remote desktop" Andy Kemshall, SecurEnvoy
10 Has Islamism truly been tamed in Tunisia? HUSAM DUGHMAN, AUTHOR/POLITICAL ANALYST
11 Message to Americans: "Let's get to work" BARACK OBAMA, PRESIDENT OF THE UNITED STATES OF AMERICA
12 The Rise of Women in Current British Politics and Business LOUIS CLAYTON
13 Lord £2's gaffe Louis Clayton
14 Top Five Tips for Security Behavior Management Programmes SCOTT GREAUX, VICE PRESIDENT, PRODUCTS AND SERVICES, PHISHME
15 After Gmail hacking: conventional password protection is not enough THE EDITORIAL TEAM