Research Group discovers vulnerabilities in the Ad... » Check Point has announced that its Security Research Group has discovered vulnerabilities in the Adm... Intamac chosen to develop innovative Cloud Video R... » Vigilance can report that Intamac has been selected by Swann Communications to develop an innovative... Cardinal Group basks in the glory of many accolade... » The Cardinal Group Retail Fraud Awards 2014 Vigilance can report that the Cardinal Group, celebrate... The need to understand, observe, obey and respect ... » This is an observation in the course of my security business over the years in which people love and... Emergency services show attracts record number of ... » Organisers of The Emergency Services Show have confirmed that the two-day event held at the NEC in B... WordPress still vulnerable ...old plugins give eas... » Plugins and extensions: the Achilles heel of popular CMSs A by-product of High-Tech Bridge’s Immuni... Reaper goes East! » UK Reaper Remotely Piloted Aircraft Systems (RPAS) would be deployed to the Middle East to support c... LTE Africa creates connected communities » Cape Town, South Africa: As LTE subscriptions in Africa continue to grow, and with 50% of the popula... Protecting the mobile devices of first responders » Seattle, WA: Sir Lancelot’s Armor today announced that they are offering their Holy Grail screen pro... MPS reacts to ONS crime statistics » MPS response to the quarterly crime figures released by the Office for National Statistics yesterday...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Lord £2's gaffe Louis Clayton
2 Top Five Tips for Security Behavior Management Programmes SCOTT GREAUX, VICE PRESIDENT, PRODUCTS AND SERVICES, PHISHME
3 After Gmail hacking: conventional password protection is not enough THE EDITORIAL TEAM
4 Countering the cost of compliance EMILY WOJCIK, SENIOR PRODUCT MARKETING MANAGER-INFORMATION MANAGEMENT, COMMVAULT
5 Context hacks into Canon IoT Printer to run Doom PETER RENNISON AND ALLIE ANDREWS
6 A Light Bulb Moment! JAMIE WILSON, EMEA SECURITY MARKETING, NICE
7 Avoiding the pitfalls of cloud storage failure GAVIN MCLAUGHLIN, VICE PRESIDENT, WORLD WIDE MARKETING, X-10
8 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS, ACCESS
9 Desktop Strategy: Why virtualisation is not the (only) answer Kevin Linsell, Head of Service Development, Adapt
10 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS ACCESS
11 Desktop Strategy: Why virtualisation is not the (only) answer KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPT
12 The Past in the Present AYEWOH ITUAH, SECURITY ANALYST/CONSULTANT
13 Genuine Two-Factor Authentication TOYIN ADELAKUN, VICE PRESIDENT, SESTUS
14 The Islamic State Group in a Nutshell HUSAM DUGHMAN, AUTHOR AND POLITICAL SCIENTIST
15 Is £266bn just the tip of the Cybercrime iceberg? MARK SPARSHOTT, EMEA DIRECTOR, PROOFPOINT