BSI Standards Awards recognizes outstanding c... » BSI, the UK’s National Standards Body has officially recognized the outstanding contributions of its... Gartner names proofpoint a leader in 2014 Magic ... » London, UK: Proofpoint, Inc. has been positioned by Gartner, Inc. in the leaders quadrant of the 201... Tenable's Nessus v6 Eliminates cybersecurity blind... » COLUMBIA, Md./LONDON, UK: Tenable Network Security, Inc. has announced the release of Nessus® v6, re... New German heavy tanks bring serious firepower i... » Wargaming announced today the launch of the latest content update for its free-to-play console multi... Babcock to run Defence Support Group » The Ministry of Defence (MOD) has today announced the preferred bidder for the Defence Support Group... Free white paper explains how network access can... » London: According to the International Telecommunication Union (ITU), there are now as many mobile p... Kroll Ontrack published list of worst data disaste... » EPSOM: Kroll Ontrack announced its 12th annual list of the top 10 data disasters from 2014. For the ... UPnP Forum invites organizations to use UPnP+ Cert... » UPnP Forum has launched its UPnP+ Certification level for improved device and open source implementa... CNL Software to present PSIM at Teleste Video Su... » CNL Software will be participating in the Teleste Video Surveillance Summit in Dubai on December 7, ... ExtraHop integrates with FireEye to defend against... » LAS VEGAS, NV: ExtraHop has announced an integration of the ExtraHop wire data analytics platform wi...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Are you planning to build a security platform? STEVE SALINAS, PRODUCT MANAGER, ALERT LOGIC
2 "New Security flaw exposed in Microsoft’s remote desktop" Andy Kemshall, SecurEnvoy
3 Has Islamism truly been tamed in Tunisia? HUSAM DUGHMAN, AUTHOR/POLITICAL ANALYST
4 Message to Americans: "Let's get to work" BARACK OBAMA, PRESIDENT OF THE UNITED STATES OF AMERICA
5 The Rise of Women in Current British Politics and Business LOUIS CLAYTON
6 Lord £2's gaffe Louis Clayton
7 Top Five Tips for Security Behavior Management Programmes SCOTT GREAUX, VICE PRESIDENT, PRODUCTS AND SERVICES, PHISHME
8 After Gmail hacking: conventional password protection is not enough THE EDITORIAL TEAM
9 Countering the cost of compliance EMILY WOJCIK, SENIOR PRODUCT MARKETING MANAGER-INFORMATION MANAGEMENT, COMMVAULT
10 Context hacks into Canon IoT Printer to run Doom PETER RENNISON AND ALLIE ANDREWS
11 A Light Bulb Moment! JAMIE WILSON, EMEA SECURITY MARKETING, NICE
12 Avoiding the pitfalls of cloud storage failure GAVIN MCLAUGHLIN, VICE PRESIDENT, WORLD WIDE MARKETING, X-10
13 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS, ACCESS
14 Desktop Strategy: Why virtualisation is not the (only) answer Kevin Linsell, Head of Service Development, Adapt
15 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS ACCESS