Free-of-charge white paper informs about the ris... » London: Wherever secure transactions or network access are required, the person requesting access fi... KAICIID joins call by the global community to end ... » In northern Iraq, brutal violence has led to the murder of thousands of innocent civilians. Many rel... Former Army Air Corps pilot helps limbless veteran... » The Gazelle Military Helicopter Trust has been set up to restore Gazelle helicopters that have been ... Best Use of Stop and Search scheme » The Metropolitan Police Service [MPS] welcomes today's further announcement by the Home Secretary re... IPSecurityCenter chosen for Hospital PSIM Project ... » CNL Software has been chosen to provide a comprehensive security management system for a hospital fa... Check Point makes it again as a leader in the Gar... » Check Point has announced that it is again positioned as a Leader in the 2014 Gartner Magic Quadrant... NXT-ID approved for NASDAQ capital market listing » SHELTON, Conn.: NXT-ID, Inc. has announced that its shares of common stock and the warrants to purch... Notting Hill Housing Group chooses Guardian24 to p... » Belfast, UK: One of London’s leading housing associations continues investment in their staff’s pers... Parallels launches Parallels Desktop 10 for Mac ... » LONDON, UK: Parallels has launched Parallels Desktop® 10 for Mac and Parallels Desktop 10 for Mac En... Transactis wins Management Today award for work th... » Consumer insight and anti-fraud company Transactis has been named SME (Small and Medium Enterprise) ...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS ACCESS
2 Desktop Strategy: Why virtualisation is not the (only) answer KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPT
3 The Past in the Present AYEWOH ITUAH, SECURITY ANALYST/CONSULTANT
4 Genuine Two-Factor Authentication TOYIN ADELAKUN, VICE PRESIDENT, SESTUS
5 The Islamic State Group in a Nutshell HUSAM DUGHMAN, AUTHOR AND POLITICAL SCIENTIST
6 Is £266bn just the tip of the Cybercrime iceberg? MARK SPARSHOTT, EMEA DIRECTOR, PROOFPOINT
7 The Snowden Wasteland CALUM MACLEOD, VICE PRESIDENT, EMEA, LIBERMAN SOFTWARE
8 Looking Ahead: What Is Shaping The IAM Industry Colin Miles, CTO, Pirean
9 US Middle Eastern Policy Needs a Radical Shift of Focus HUSAM DUGHMAN, AUTHOR AND POLITICAL SCIENTIST
10 Banning Dropbox Doesn’t Work! ANDERS LOFGREN, DIRECTOR OF MOBILITY SOLUTIONS, ACRONIS
11 Education security sector growth offers significant opportunities for integrated security providers SIMON HEWITT
12 Requiem for Anti Virus Amichai Shulman, CTO Imperva
13 G-Cloud: More needs to be done to make it work CAMPBELL WILLIAMS, GROUP STRATEGY AND MARKETING DIRECTOR, SIX DEGREES
14 Essential questions to ask your Cloud Service Provider STEPHEN COTY, CHIEF SECURITY EVANGELIST, ALERT LOGIC
15 The Resurgence of Data-Entry Phishing Attacks SCOTT GREAUX, VICE PRESIDENT, PHISHME