Security Council, UN officials hail signing of Cen... » A view of thousands of internally displaced people at Bangui’s airport, Central African Republic ... Defence Secretary full of praise for military pers... » SOURCE: MoD The Defence Secretary Michael Fallon has met the regular and reserve military personnel... MoD appoints UK busisness deal maker to head SSRO » The Chair of the new body that has been established to oversee all single-source procurement by the ... The Private Security and Investigation Industry in... » Preamble Security and safety are sine qua non for human existence, survival and development. Renown... Defence Secretary gives kudos to Royal Navy's prof... » The Defence Secretary has praised the Royal Navy’s professionalism after witnessing the advanced sea... Cubic awarded $4.1 million Training Order for U.S.... » SAN DIEGO, Calif.: Cubic Corporation has announced that it was awarded a new order valued at $4.1 mi... Clavister receives initial order to secure 40 re... » Clavister receives initial order to secure 40 regional offices for Brazilian federal authority, foll... KEY ROLE OF TRAINING AND DEVELOPMENT IN THE SECURI... » Education is a process of giving and receiving systematic instruction and skills especially at a sch... Varonis DatAnywhere enables ATMI employees to shar... » LONDON (UK): Varonis Systems, Inc. has announced it has enabled the employees of ATMI to use cloud-s... The Devil is in the Data - Infographic » Irish image and data auditing company PixAlert have released an infographic highlighting the signifi...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Requiem for Anti Virus Amichai Shulman, CTO Imperva
2 G-Cloud: More needs to be done to make it work CAMPBELL WILLIAMS, GROUP STRATEGY AND MARKETING DIRECTOR, SIX DEGREES
3 Essential questions to ask your Cloud Service Provider STEPHEN COTY, CHIEF SECURITY EVANGELIST, ALERT LOGIC
4 The Resurgence of Data-Entry Phishing Attacks SCOTT GREAUX, VICE PRESIDENT, PHISHME
5 Failures of Heartbleed Response RUSS SPITLER, VICE PRESIDENT, PRODUCT STRATEGY, ALIEN VAULT
6 The rise of the cloud integrator KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPT
7 Positive Security: A new spin on Whitelisting TONY CRAYTHORNE, VICE PRESIDENT, WORLD WIDE BUSINESS DEVELOPMENT
8 Code Spaces goes the way of the Dodo STEVE SALINAS, PRODUCT MARKETING MANAGER
9 Theresa May ‘Brave and Courageous’... You Must Be Joking! CHRIS HOBBS
10 Unlocking the secrets for winning and managing Successful Commercial Contracts ADAM JOHNSON, PROJECTS MANAGER, SWIFT SAYRE SYSTEMS
11 Al-Shabaab's Attack: Quitting when one’s not on top of the game is an uncommon virtue in Nigeria DON OKEREKE, SECURITYANALYST/CONSULTANT
12 Why Immersive Training Works SCOTT GREAUX, VICE PRESIDENT, PRODUCT MANAGEMENT AND SERVICES, PHISHME
13 The evolution of technology platforms: What does this mean for businesses? WIELAND ALGE, VP AND GENERAL MANAGER, EMEA, BARRACUDA NETWORKS
14 How to combat the challenge of information security Robert O’Brien, CEO of MetaCompliance
15 Trends for 2014: Looking at the year ahead JEZ WATSON, MANAGING DIRECTOR, CD AUTOMATION