MoD to save taxpayer up to £1 billion in a new con... » The MoD has agreed a contract to update and sustain the UK’s military air traffic management which i... Lieberman Software Privilege Management Solution... » London, UK: Lieberman Software Corporation’s privilege management product, Enterprise Random Passwor... Morocco to help United Arab Emirate to combat ter... » Washington, DC: Moroccan Minister of Foreign Affairs Salaheddine Mezouar has said Morocco will provi... "Use cameras only as necessary and proportionate r... » In view of the recent warning from the Information Commissioner’s Office (ICO), it appears the days ... Creeks in Goodluck Jonathan's Niger Delta havens f... » Ogbuefi Jonathan...Nigeria's multi-billionaire President whose little corner stinks to high hea... Leadinng forensic anthropologist receives prestigi... » Vigilance can report that leading forensic anthropologist Dr Tim Thompson has been presented with ... British soldiers make last journey home after 13 ... » Can these Afghan soldiers be entrusted with the defence of democracy and their country for long? Tim... Empello’s new guardian technology protects against... » London: Empello has announced a major leap forward in its ad monitoring capabilities. The new ‘Guar... Bash Bug laughs in the face of traditional passwor... » Utrecht/Frankfurt/London: The ease with which hackers can steal sensitive login details from compani... Encap Security incorporates convenience of Apple... » Oslo & Palo Alto: Encap Security, the first in-app authentication solution to arm banks, retailers a...

CLICK HERE TO

Viewpoints Header

   Display #  
1 The Rise of Women in Current British Politics and Business LOUIS CLAYTON
2 Lord £2's gaffe Louis Clayton
3 Top Five Tips for Security Behavior Management Programmes SCOTT GREAUX, VICE PRESIDENT, PRODUCTS AND SERVICES, PHISHME
4 After Gmail hacking: conventional password protection is not enough THE EDITORIAL TEAM
5 Countering the cost of compliance EMILY WOJCIK, SENIOR PRODUCT MARKETING MANAGER-INFORMATION MANAGEMENT, COMMVAULT
6 Context hacks into Canon IoT Printer to run Doom PETER RENNISON AND ALLIE ANDREWS
7 A Light Bulb Moment! JAMIE WILSON, EMEA SECURITY MARKETING, NICE
8 Avoiding the pitfalls of cloud storage failure GAVIN MCLAUGHLIN, VICE PRESIDENT, WORLD WIDE MARKETING, X-10
9 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS, ACCESS
10 Desktop Strategy: Why virtualisation is not the (only) answer Kevin Linsell, Head of Service Development, Adapt
11 Access: Embracing Secure BYOD - what you need to know ANDERS LOFGREN, VICE PRESIDENT, PRODUCT MANAGEMENT, ACRONIS ACCESS
12 Desktop Strategy: Why virtualisation is not the (only) answer KEVIN LINSELL, HEAD OF SERVICE DEVELOPMENT, ADAPT
13 The Past in the Present AYEWOH ITUAH, SECURITY ANALYST/CONSULTANT
14 Genuine Two-Factor Authentication TOYIN ADELAKUN, VICE PRESIDENT, SESTUS
15 The Islamic State Group in a Nutshell HUSAM DUGHMAN, AUTHOR AND POLITICAL SCIENTIST