Six Degrees Group educates public sector in cloud ... » LONDON, U.K: Six Degrees Group (6DG) has announced that it is continuing to educate the public secto... Security Industry Authority renews NSI's mandate t... » The Security Industry Authority (SIA) has renewed the National Security Inspectorate’s (NSI) mandate... Goodluck Jonathan: The limits of goodluck » A quintessential fibre of a discerning leader or anybody who aspires to a leadership position is mas... Dimension data launches strategy to help organis... » The rising cost of energy, real estate, and office space, coupled with growing pressure to implement... New learning materials for updated security qual... » A new range of learning resources has been launched by Highfield.co.uk to help educators and learner... UK: Service of commemoration scheduled for Marc... » The Prime Minister David Cameron announced yesterday in the House of Commons that a Service of Comme... Clavister launches entry-level W20 Firewall » Clavister has announced the launch of its new Clavister W20 firewall appliance. The new product is t... Tinubu Risk Management Center to go live in Janu... » Tinubu Square, the trusted source of credit risk solutions for trade credit insurers and businesses,... BAE Systems awarded £50 million contract » Photo: MoD Photo: MoD The Ministry of Defence (MOD) has awarded a £50m contract to BAE Systems t... Octavian opens new office in South Africa » Octavian Security has kicked off its ambitious 2015 growth plans by launching a new South African of...

CLICK HERE TO

Viewpoints Header

   Display #  
1 Malaysia Airlines data dump threat Lucy Harvey
2 Seven things you need to know about the “GHOST” vulnerability Szilard Stange, director of product management, OPSWAT
3 Fixing weak passwords CHRIS STONEFF
4 The psychology of phishing MARK SPARSHOTT, EMEA DIRECTOR, PROOFPOINT
5 Now What? Why we should talk about incident response Carolina Brealey
6 How to Start the New Year on the Right Security Foot Stephen Coty, chief security evangelist, Alert Logic
7 New Global Cyber Threat targets Banks and Retailers ANDY CHANDLER
8 Is Cloud Security an Oxymoron? GILAD PARANN-NISSANY, CO-FOUNDER AND CEO, PORTICO
9 How to handle the security problem with big data GUILLERMO LAFUENTE, SECURITY CONSULTANT, MWR, INFOSECUIRTY
10 The Internet of Things (IoT) Will Fail if Security Has No Context Neil Chapman SVP & MD EMEA and International, ForgeRock
11 Next-Gen Network Monitoring: The Missing Piece of the Security Puzzle JESSE ROTHSTEIN, CEO AND CO-FOUNDER, EXTRAHOP NETWORKS
12 Is Turkey a successful Islamist model? HUSAM DUGHMAN
13 What is Point-Of-Sale (POS) Malware: The Top 10 most prolific POS malware families BRANDON TANSEY, SECURITY RESEARCHER. LANCOPE
14 Next-Gen Network Monitoring: The Missing Piece of the Security Puzzle Jesse Rothstein, CEO and co-founder of ExtraHop Networks
15 Are you planning to build a security platform? STEVE SALINAS, PRODUCT MANAGER, ALERT LOGIC