Tripwire announces asset discovery solution » PORTLAND, Ore.: Tripwire, Inc., has announced the debut of Tripwire® Asset Discovery Appliances, a h... Master Locksmiths Association joins powered gate... » The Master Locksmiths Association (MLA), the UK's leading trade association for the locksmith indust... Collyer Bristow is Deploying Enterprise Resource P... » LONDON, U.K LexisNexis® Enterprise has announced that Collyer Bristow LLP, a London-based law firm s... gateprotect listed in the Magic Quadrant for UTM F... » Hamburg: gateprotect, a German IT security specialist within the Rohde & Schwarz company group, was ... Duo to raise money for Blesma as part of Deloitte’... » Mark Powell, 42, and Matthew Toye, 43, will be cycling nearly 1000 miles from Land’s End to John O’G... Why so many security breaches in and around the ... » Thought it was time to get back in touch now that the summer seems to be over. Kids, or in my case g... Wrightstyle and escaping from prison fires » Wrightstyle Limited is a leading UK supplier of integrated steel and aluminium glazing systems and e... UK lockmakers meet lock attack challenge » UK police are continuing to warn householders about the vulnerability of domestic entrance door lock... Short review of the US National Military Strategy ... » It is imperatively important to underline the fact that recently published National Military Strateg... One veteran's perspective on the Iran deal » The White House, Washington I was in the first company of Marines to enter Baghdad in 2003. As a co...

CLICK HERE TO

Viewpoints Header

   Display #  
1 How to Solve the Five Biggest Email Security Problems MIKE SPYKERMAN, VICE PRESIDENT, PRODUCT MANAGEMENT
2 Professional Services Firms - A Soft Route To The Hackers’ Real Target? Ian Kilpatrick, chairman Wick Hill Group
3 Protect Your Data: Top Ten “Need to Know” Tips DIETRICH BENJES, VICE PRESIDENT, UK, IRELAND AND THE MIDDLE EAST
4 The NYSE, United Airlines and WSJ KEMAL BALIOGLU, VICE PRESIDENT OF PRODUCTS, QUORUM
5 Fighting cyber crime with tech only will result in loss ILIA KOLOCHENKO,CEO, HIGH-TECH BRIDGE
6 The Enemy Within: Combatting Insider Threats in the Contact Centre MATTHEW BRYARS, CEO AND CO-FOUNDER AERIANDI
7 Solving the Dropbox dilemma MARK EDGE, UK COUNTRY MANAGER AND VP, SALES, BRAINLOOP
8 The Financial Industry’s Biggest Threat DEBORAH GALEA, HEAD, PRODUCT MARKETING, OPSWAT
9 Obamacare: This is Healthcare in America! BARACK OBAMA, PRESIDENT OF THE UNITED STATES OF AMERICA
10 How can hospitals protect their medical equipment from malware? ADAM WINN, SENIOR PRODUCT MANAGER, OPSWAT
11 Protests or Profiteering...The Hack Remains in Same STEPHEN COTY, CHIEF SECURITY EVANGELIST, ALERT LOGIC
12 Hackers are Using DDoS to Profile Your Network DAVE LARSON, CTO, CORERO NETWORK
13 Taking it easy...small data JONATHAN WILKINS, MARKETING MANAGER, EUROPEAN AUTOMATION
14 Hackers Have Personnel Data on Every Federal Employee Philip Lieberman, CEO and President of Lieberman Software Corporation
15 Why insider threats are succeeding TK KEANINI, CTO LANCOPE