NICC Sets new requirements for Customer Line Ident... » London: NICC, the UK’s technical forum for telecommunications, has published its updated specificati... First all-amputee team set record with English Cha... » Four Blesma Members have become the first all-amputee team to successfully swim the English Channel.... World of tanks to get race mode » Wargaming has announced the addition of Tank Rally mode to its free-to-play online action game World... Alert Logic launches UK Data Centre » London, UK: Alert Logic has completed its European Data Centre and now available for partners and cu... 20th Anniversary of VAWA: "...the decency of the A... » JB...advancing Bidenism with respect to womenfolks Watch the Video: www.youtube.com/embed/HpL-A6Z... Lord-Lieutenant of Hampshire presents Sonardyne wi... » Lord-Lieutenant of Hampshire presents Sonardyne with Queen’s Award for 6G Sonardyne International L... Rehousing TYphoon Aircraft of Number 1 (Fighter) ... » The Rt Hon Michael Fallon MP, UK Secretary of State for Defence The Typhoon aircraft of Number 1(Fi... Peplink signs distribution agreement with 4Gon » Wireless connectivity innovator and specialist wireless technology distributor form partnership UK:... Independent Scotland: Naked and Alone as UK Counte... » In the great debate on Scottish independence, little has been said by either side as to how a ‘yes’ ... Foundry in Nigeria: Investment Opportunities, Chal... » Introduction For the interest of the uninitiated and to further appreciate the subject, a definitio...

CLICK HERE TO

Viewpoints Header

   Display #  
1 After Gmail hacking: conventional password protection is not enough John Aduma
2 Countering the cost of compliance EMILY WOJCIK, SENIOR PRODUCT MARKETING MANAGER-INFORMATION MANAGEMENT, COMMVAULT
3 Context hacks into Canon IoT Printer to run Doom PETER RENNISON AND ALLIE ANDREWS
4 A Light Bulb Moment! JAMIE WILSON, EMEA SECURITY MARKETING, NICE
5 Avoiding the pitfalls of cloud storage failure GAVIN MCLAUGHLIN, VICE PRESIDENT, WORLD WIDE MARKETING, X-10
6 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS, ACCESS
7 Desktop Strategy: Why virtualisation is not the (only) answer Kevin Linsell, Head of Service Development, Adapt
8 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS ACCESS
9 Desktop Strategy: Why virtualisation is not the (only) answer KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPT
10 The Past in the Present AYEWOH ITUAH, SECURITY ANALYST/CONSULTANT
11 Genuine Two-Factor Authentication TOYIN ADELAKUN, VICE PRESIDENT, SESTUS
12 The Islamic State Group in a Nutshell HUSAM DUGHMAN, AUTHOR AND POLITICAL SCIENTIST
13 Is £266bn just the tip of the Cybercrime iceberg? MARK SPARSHOTT, EMEA DIRECTOR, PROOFPOINT
14 The Snowden Wasteland CALUM MACLEOD, VICE PRESIDENT, EMEA, LIBERMAN SOFTWARE
15 Looking Ahead: What Is Shaping The IAM Industry Colin Miles, CTO, Pirean