
Paul Judd, Fortinet: Trimming the excess
2 April 2008 by Marc Jacob
Nick Sears, FaceTime Communications: The unseen greynet threat
2 April 2008 by Nick Sears, VP EMEA, FaceTime Communications
Marc Hudavert, ActivIdentity: Smart cards – debunking the myths
2 April 2008 by Marc Hudavert, vice-president and general manager of EMEA, ActivIdentity
Chris Petersen, LogRhythm: The Needles in the Haystack… What Every Security Officer Needs to Know about Log Management
2 April 2008 by Chris Petersen, founder and CTO of LogRhythm
Ian Kilpatrick, Wick Hill Group: What Firewall Do And What Firewalls Don’t Do
26 March 2008 by Ian Kilpatrick, chairman Wick Hill Group
Geoff Sweeney, Tier-3: The Threat Within: Data Breaches from Unauthorized Access and Improper Use
16 March 2008 by Geoff Sweeney, CTO, Tier-3
David Barroso Berrueta, S21sec: New objective of online fraud, control of domains
13 March 2008 by David Barroso Berrueta, R&D CTO, S21sec
Xabier Mitxelena Ruiz, S21sec: A new era in cybernetic attack
13 March 2008 by Xabier Mitxelena Ruiz, General Manager, S21sec
Pete Simpson, Clearswift Corporation: Web developers in a Web 2.0 World
13 March 2008 by Pete Simpson, ThreatLab Manager, Clearswift Corporation
Anton Levchuk, Famatech: Remote administration: big brother or front-line tool?
13 March 2008 by Anton Levchuk, Marketing Director, Famatech
Ian Kilpatrick, Wick Hill: Mobile and Remote Working: is it Secure?
12 March 2008 by Ian Kilpatrick, chairman of Wick Hill Group, specialists in secure
Brian Davey, Teed Business Continuity Ltd: Reviewing Business Continuity in Your Organisation’s Supply Chain
10 March 2008 by Brian Davey, Senior Consultant, Teed Business Continuity Ltd.
Greg Day, EMEA McAfee: European Businesses need to take responsibility for the security of their data, and protect themselves against both internal and external threats
6 March 2008 by Greg Day, EMEA Security Analyst, McAfee
Richard Baker, BT Global Services: Diplomas for collaboration
6 March 2008 by Richard Baker, principal identity management consultant, BT Global Services
Pete Simpson, Clearswift: Return of the Super Worm
6 March 2008 by Pete Simpson, ThreatLab Manager at Clearswift
Bruce Schneier, BT: Information security, How liable should vendors be?
6 March 2008 by Bruce Schneier, BT
Greg Day, McAfee: Security as a Service Delivers Total Protection
6 March 2008 by Greg Day, EMEA Security Analyst, McAfee
Calum Macleod, Cyber-Ark: IT Thrill Seekers
4 March 2008 by Calum Macleod, Cyber-Ark
Richard Moulds, Ncipher: The Future of Encryption
28 February 2008 by By Richard Moulds, Executive VP Product Strategy Ncipher
Jorge Hermosillo, Optenet: Virtual security, an added value for operators
28 February 2008 by Jorge Hermosillo, Optenet Alliances Director
Piers Wilson, Siemens: Sometimes the horse will bolt … how do you close the stable door?
28 February 2008 by Piers Wilson, Head of Technical Assurance, Insight Consulting, a division of Siemens Enterprise Communications Limited
Clifford May, Integralis: Compliance - Overhead or Business Benefit?
28 February 2008 by Clifford May, Integralis
Alexei Lesnykh, Smartline: The Impact of the Consumerization of IT on IT Security Management
28 February 2008 by Alexei Lesnykh, Smartline
Humphrey Christian, Altiris: Analyse This!
28 February 2008 by Humphrey Christian, Asset Management Consultant for Altiris (now part of Symantec)
Dr Bernard Parsons, CTO, BeCrypt Ltd: Trusting Unmanaged Machines
21 February 2008 by Marc Jacob
Bernard Everett, InfoGuard: Cyber crime threatens the core infrastructure supporting critical business activities, Tapping into fibre optic cables is easier than you think!
21 February 2008 by Bernard Everett, Region Sales Director Western and Southern Europe InfoGuard
Your podcast HereNew, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr
All new podcasts