ANNUAL ARMED FORCES COVENANT REPORT PUBLISHED » THE Armed Forces Covenant Annual Report has been presented to Parliament today and details the progr... Opengear Continues EMEA Momentum » Slough UK:  Opengear has announced its most impressive year in EMEA with across the board growth. 2... America and Boko Haram: Challenges and Responses ... » IN PRAISE OF SELF-RELIANCE Obama's America...not a friend in need, hence not a friend indee... Military training set to be improved with trees » Soldiers using Catterick Training Area (CTA) are set to benefit from improved facilities thanks to t... Ukraine source of Cyber Monday attack campaigns » .........Online Shopping Season - The Stuffed Turkey Effect Data centre security company Imperva ha... In the beginning, there were Christmas jumpers and... » ......Jingle Beards… And Christmas Trimmings -          Artist creates stunning festive sculptures ... Reservists getting ready for mission in West Afric... » Vigilance can report that the first UK reserves are joining nearly 100 regular counterparts as they ... A call for reflection on the anniversary of the... » On the anniversary of the conflict in South Sudan, Minister for Africa James Duddridge writes: ALPRO AT FARNBOROUGH INTERNATIONAL AIRSHOW » Aluminium fabricator Veranti are using transom closers from Alpro on new metal-clad modular building... Centerprise awarded three Lots on £6bn CCS RM1054 ... » Centerprise were approved on the three lots that they tendered for on the Crown Commercial Service (...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Is Cloud Security an Oxymoron? GILAD PARANN-NISSANY, CO-FOUNDER AND CEO, PORTICO
2 How to handle the security problem with big data GUILLERMO LAFUENTE, SECURITY CONSULTANT, MWR, INFOSECUIRTY
3 The Internet of Things (IoT) Will Fail if Security Has No Context Neil Chapman SVP & MD EMEA and International, ForgeRock
4 Next-Gen Network Monitoring: The Missing Piece of the Security Puzzle JESSE ROTHSTEIN, CEO AND CO-FOUNDER, EXTRAHOP NETWORKS
5 Is Turkey a successful Islamist model? HUSAM DUGHMAN
6 What is Point-Of-Sale (POS) Malware: The Top 10 most prolific POS malware families BRANDON TANSEY, SECURITY RESEARCHER. LANCOPE
7 Next-Gen Network Monitoring: The Missing Piece of the Security Puzzle Jesse Rothstein, CEO and co-founder of ExtraHop Networks
8 Are you planning to build a security platform? STEVE SALINAS, PRODUCT MANAGER, ALERT LOGIC
9 "New Security flaw exposed in Microsoft’s remote desktop" Andy Kemshall, SecurEnvoy
10 Has Islamism truly been tamed in Tunisia? HUSAM DUGHMAN, AUTHOR/POLITICAL ANALYST
11 Message to Americans: "Let's get to work" BARACK OBAMA, PRESIDENT OF THE UNITED STATES OF AMERICA
12 The Rise of Women in Current British Politics and Business LOUIS CLAYTON
13 Lord £2's gaffe Louis Clayton
14 Top Five Tips for Security Behavior Management Programmes SCOTT GREAUX, VICE PRESIDENT, PRODUCTS AND SERVICES, PHISHME
15 After Gmail hacking: conventional password protection is not enough THE EDITORIAL TEAM