International SOS and Vismo in joint partnership t... » York, UK: International SOS, the world's leading medical and security services company, and Vismo, a... Tech Mahindra selects Qualys to expand global IT s... » REDWOOD CITY, Calif.: Qualys, Inc. has announced a strategic partnership with Tech Mahindra , a mult... Barracuda launches SignNow Appliance » Barracuda Networks has launched the Barracuda SignNow version 4.0 and the new Barracuda SignNow Appl... Boston Networks design, deliver and maintain Intel... » Regarded as the world’s most prestigious team golf event, Boston Networks delivers a full turnkey so... British Parliament tells Teeside University to sta... » Ground-breaking research at Teesside University which has been described as the “holy grail” of crim... Army Officer wins engineering Modern Day Visionary... » Source: MoD AIRCRAFT Engineering Officer Major Oli Morgan has been named as the 2014 Modern Day V... Electronic I.D. Card project in Nigeria: How not t... » President Goodluck Jonathan recently launched a MasterCard-branded Nigerian National Electronic I.D ... Do you know which smartphone is the most popular s... » Surprisingly, it’s not the iPhone, LG, Huawei or HTC and Windows Phone hardly gets a look in. Even t... Auditors stresses importance of CHD Discovery » PCIQ2PCIQ3 Despite the fact that over 76% of QSAs and ISAs consider card holder data (CHD) discover... BSIA makes case for private security industry » With Conference season upon us, the British Security Industry Association (BSIA), has been busy cham...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Top Five Tips for Security Behavior Management Programmes SCOTT GREAUX, VICE PRESIDENT, PRODUCTS AND SERVICES, PHISHME
2 After Gmail hacking: conventional password protection is not enough THE EDITORIAL TEAM
3 Countering the cost of compliance EMILY WOJCIK, SENIOR PRODUCT MARKETING MANAGER-INFORMATION MANAGEMENT, COMMVAULT
4 Context hacks into Canon IoT Printer to run Doom PETER RENNISON AND ALLIE ANDREWS
5 A Light Bulb Moment! JAMIE WILSON, EMEA SECURITY MARKETING, NICE
6 Avoiding the pitfalls of cloud storage failure GAVIN MCLAUGHLIN, VICE PRESIDENT, WORLD WIDE MARKETING, X-10
7 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS, ACCESS
8 Desktop Strategy: Why virtualisation is not the (only) answer Kevin Linsell, Head of Service Development, Adapt
9 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS ACCESS
10 Desktop Strategy: Why virtualisation is not the (only) answer KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPT
11 The Past in the Present AYEWOH ITUAH, SECURITY ANALYST/CONSULTANT
12 Genuine Two-Factor Authentication TOYIN ADELAKUN, VICE PRESIDENT, SESTUS
13 The Islamic State Group in a Nutshell HUSAM DUGHMAN, AUTHOR AND POLITICAL SCIENTIST
14 Is £266bn just the tip of the Cybercrime iceberg? MARK SPARSHOTT, EMEA DIRECTOR, PROOFPOINT
15 The Snowden Wasteland CALUM MACLEOD, VICE PRESIDENT, EMEA, LIBERMAN SOFTWARE