Options upgrades low latency route between Cartere... » New York: Options has announced that it has upgraded the route between the firm’s data center facili... Cloud World Forum examines security, privacy and r... » London: As the adoption of cloud computing continues to grow across the world, security, privacy and... U.S. Air Force selects Cubic for Moroccan P5 Air C... » Cubic Defense Systems, a subsidiary of Cubic Corporation has been awarded a contract valued at more ... Tokenless two-factor authentication defies “Heartb... » London: The existence of Heartbleed, a vulnerability in the OpenSSL open source software, was recent... Advanced application security now standard on Barr... » Basingstoke:  Barracuda Networks, Inc. has announced that it will offer advanced application securit... Check Point provides multiple protections against ... » Check Point has announced that its network security products offer multiple protections against the ... Tyco UAE and CNL Software partner for major UAE pr... » CNL Software has partnered for an iconic security management project with Tyco Fire & Security UAE, ... Cubic unveils new corporate branding » SAN DIEGO, Calif.: Cubic Corporation has introduced its new corporate brand identity. The name Cubic... Taxware acquires VAT Resource...enhances value add... » Wilmington, MA.: axware, a global provider of sales, use and value added tax (VAT) compliance softwa... Courion expands international footprint with two n... » London, UK: Courion has announced two new hires in the UK and the Middle East to help boost its stra...

CLICK HERE TO

Viewpoints Header

   Display #  
1 How to combat the challenge of information security Robert O’Brien, CEO of MetaCompliance
2 Trends for 2014: Looking at the year ahead JEZ WATSON, MANAGING DIRECTOR, CD AUTOMATION
3 Will the Target fallout shift focus away from compliance? ALLAN CARREY, VICE PRESIDENT, PHISHME
4 Don’t let Snowden Leaks chill cloud adoption CAMPBEL WILLIAMS, GROUP STRATEGY AND MARKETING DIRECTOR, SIX DEGREE GROUP
5 It Can Be Easy Being Green JOHN DAVIES, MANAGING DIRECTOR, TDSi
6 Why CMS Is Breeding Security Vulnerabilities BARRY SHTEIMAN
7 Terror attacks in Nigeria: Another Massacre of School Children By Boko Haram DON OKEREKE, SECURITY ANALYST/CONSULTANT
8 Five lessons we can learn from financial services and compliance DWAYNE MELANCON, CTO, TRIPWIRE
9 Facing Extinction: Is There Any Hope For The Species? CALUM MACLEOD, VICE PRESIDENT OF EMEA, LIEBERMAN SOFTWARE CORPORATION
10 “We all deserve the security that comes from having health coverage that's there for us” MICHELLE OBAMA, FIRST LADY, UNITED STATES OF AMERICA
11 Video security in industry and production, despite Rough Conditions DR MAGNUS EKEROT, CEO, MOBOTIX AG
12 Resolving Extra-judicial Killings, Crimes and Spurious Acquittals in Nigeria DON OKEREKE, SECURITY ANALYST/CONSULTANT
13 Are your assets exposed or covered in the cloud? BY MARK KRAYNAK, SENIOR VICE PRESIDENT, WORLDWIDE MARKETING, IMPERVA
14 Kevin Linsell’s Top IT New Year’s Resolutions for 2014 KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPTS
15 Demystifying Big Data's Next Conquest: Physical Security BOB BANERJEE, SENIOR DIRECTOR, TRAINING AND DEVELOPMENT, NICE SYSTEMS