MoD's Naval Base investment sustains over 7, 500 j... » Vigilance can report that the MoD has awarded £3.2 billion of contracts to support the management of... Wilson James scores first...receives ISO 28000 S... » The global transportation of goods is getting tougher as organizations operating in high risk countr... ExMeshTM to launch 'Approved Contractor' training ... » UK: ExMeshTM, an industry leading manufacturer of perimeter fencing systems, is to launch an “Approv... Becrypt continues expansion in US with appointme... » Seeds of Genius, a specialist supplier to Federal Government and DOD, has joined the fast-growing nu... Lancope Strengthens Cisco pxGrid Support for faste... » LONDON (UK): Lancope, Inc.is providing tight product integration with the new Cisco Identity Service... International SOS and Vismo in joint partnership t... » York, UK: International SOS, the world's leading medical and security services company, and Vismo, a... Tech Mahindra selects Qualys to expand global IT s... » REDWOOD CITY, Calif.: Qualys, Inc. has announced a strategic partnership with Tech Mahindra , a mult... Barracuda launches SignNow Appliance » Barracuda Networks has launched the Barracuda SignNow version 4.0 and the new Barracuda SignNow Appl... Boston Networks design, deliver and maintain Intel... » Regarded as the world’s most prestigious team golf event, Boston Networks delivers a full turnkey so... British Parliament tells Teeside University to sta... » Ground-breaking research at Teesside University which has been described as the “holy grail” of crim...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Top Five Tips for Security Behavior Management Programmes SCOTT GREAUX, VICE PRESIDENT, PRODUCTS AND SERVICES, PHISHME
2 After Gmail hacking: conventional password protection is not enough THE EDITORIAL TEAM
3 Countering the cost of compliance EMILY WOJCIK, SENIOR PRODUCT MARKETING MANAGER-INFORMATION MANAGEMENT, COMMVAULT
4 Context hacks into Canon IoT Printer to run Doom PETER RENNISON AND ALLIE ANDREWS
5 A Light Bulb Moment! JAMIE WILSON, EMEA SECURITY MARKETING, NICE
6 Avoiding the pitfalls of cloud storage failure GAVIN MCLAUGHLIN, VICE PRESIDENT, WORLD WIDE MARKETING, X-10
7 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS, ACCESS
8 Desktop Strategy: Why virtualisation is not the (only) answer Kevin Linsell, Head of Service Development, Adapt
9 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS ACCESS
10 Desktop Strategy: Why virtualisation is not the (only) answer KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPT
11 The Past in the Present AYEWOH ITUAH, SECURITY ANALYST/CONSULTANT
12 Genuine Two-Factor Authentication TOYIN ADELAKUN, VICE PRESIDENT, SESTUS
13 The Islamic State Group in a Nutshell HUSAM DUGHMAN, AUTHOR AND POLITICAL SCIENTIST
14 Is £266bn just the tip of the Cybercrime iceberg? MARK SPARSHOTT, EMEA DIRECTOR, PROOFPOINT
15 The Snowden Wasteland CALUM MACLEOD, VICE PRESIDENT, EMEA, LIBERMAN SOFTWARE