Check Point provides multiple protections against ... » Check Point has announced that its network security products offer multiple protections against the ... Tyco UAE and CNL Software partner for major UAE pr... » CNL Software has partnered for an iconic security management project with Tyco Fire & Security UAE, ... Cubic unveils new corporate branding » SAN DIEGO, Calif.: Cubic Corporation has introduced its new corporate brand identity. The name Cubic... Taxware acquires VAT Resource...enhances value add... » Wilmington, MA.: axware, a global provider of sales, use and value added tax (VAT) compliance softwa... Courion expands international footprint with two n... » London, UK: Courion has announced two new hires in the UK and the Middle East to help boost its stra... Skyscape sponsors race across America team in supp... » London: Skyscape Cloud Services Limited has announced that it is supporting the London Pride Spinhal... gateprotect becomes a Member of the German Allianc... » Hamburg: gateprotect AG Germany, Germany’s leading independent IT security specialist, has been admi... Building big ideas from small bricks: COPA-DATA la... » Since the beginning of April, LEGO bricks have been taking over the desks and offices of students, e... HeartBleed Vulnerabil​ity Overshadow​s Patch Tuesd... » In this blog Wolfgang Kandek, CTO, Qualys, detailS the vulnerability in OpenSSL and how it can be... Forensic experts team up with Teesside University ... » Leading forensic experts and law enforcement professionals recently gathered to find out how Tee...

CLICK HERE TO

Viewpoints Header

   Display #  
1 How to combat the challenge of information security Robert O’Brien, CEO of MetaCompliance
2 Trends for 2014: Looking at the year ahead JEZ WATSON, MANAGING DIRECTOR, CD AUTOMATION
3 Will the Target fallout shift focus away from compliance? ALLAN CARREY, VICE PRESIDENT, PHISHME
4 Don’t let Snowden Leaks chill cloud adoption CAMPBEL WILLIAMS, GROUP STRATEGY AND MARKETING DIRECTOR, SIX DEGREE GROUP
5 It Can Be Easy Being Green JOHN DAVIES, MANAGING DIRECTOR, TDSi
6 Why CMS Is Breeding Security Vulnerabilities BARRY SHTEIMAN
7 Terror attacks in Nigeria: Another Massacre of School Children By Boko Haram DON OKEREKE, SECURITY ANALYST/CONSULTANT
8 Five lessons we can learn from financial services and compliance DWAYNE MELANCON, CTO, TRIPWIRE
9 Facing Extinction: Is There Any Hope For The Species? CALUM MACLEOD, VICE PRESIDENT OF EMEA, LIEBERMAN SOFTWARE CORPORATION
10 “We all deserve the security that comes from having health coverage that's there for us” MICHELLE OBAMA, FIRST LADY, UNITED STATES OF AMERICA
11 Video security in industry and production, despite Rough Conditions DR MAGNUS EKEROT, CEO, MOBOTIX AG
12 Resolving Extra-judicial Killings, Crimes and Spurious Acquittals in Nigeria DON OKEREKE, SECURITY ANALYST/CONSULTANT
13 Are your assets exposed or covered in the cloud? BY MARK KRAYNAK, SENIOR VICE PRESIDENT, WORLDWIDE MARKETING, IMPERVA
14 Kevin Linsell’s Top IT New Year’s Resolutions for 2014 KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPTS
15 Demystifying Big Data's Next Conquest: Physical Security BOB BANERJEE, SENIOR DIRECTOR, TRAINING AND DEVELOPMENT, NICE SYSTEMS