
Credant says trashed hard drive at Pfizer would not have happened if data had been encrypted
31 May 2009 by Credant Technologies
Origin Storage says TDK bid to replace laptop hard drives with solid state technology will not fly
31 May 2009 by Origin Storage
Credant says 109,000 pension holder data loss could easily have been avoided if laptop had encryption technology
30 May 2009 by Credant Technologies
The Biometrics battle – how advancements in technology can ready consumers for a new era of airports
28 May 2009 by Roberto Tavano, Unisys
David Aminzade,Tufin: Security challenges Italian style
28 May 2009 by David Aminzade – Regional Director Tufin
IDC: Network Surveillance Technologies Take a Bite Out of Crime… and Inefficient Business Practices
25 May 2009 by IDC
Ulf Mattsson: Now, Later, Never? Analyzing the Security, Compliance and Cost Benefits of Tokenization
7 May 2009 by Marc Jacob
Calum Macleod, Tufin Technologies: Is Your Firewall A Fire Hazard
6 May 2009 by Calum Macleod, Regional Director at Tufin Technologies
Ian Kilpatrick, chairman Wick Hill Group: Ten tips to keep your business going in a pandemic
3 May 2009 by Ian Kilpatrick, chairman Wick Hill Group
Andreas Åsander, Clavister: Businesses have their heads in the cloud
1 May 2009 by Andreas Åsander, VP product management at Clavister
Qualys CTO Wolfgang Kandek Presents Laws of Vulnerabilities 2.0 at Infosecurity Europe 2009
28 April 2009 by Wolfgang Kandek, CTO, Qualys
Jean S. Bozman, Al Gillen, Stephen D. Hendrick, Crawford Del Prete: IDC opinion about Oracle’s acquisition of Sun
28 April 2009 by Jean S. Bozman, Al Gillen, Stephen D. Hendrick, Crawford Del Prete, IDC
Dan Bieler, IDC Consulting Director: Profit warning from Deutsche Telekom, the economic crisis is catching up
23 April 2009 by Dan Bieler, IDC Consulting Director
John Delaney – Research Director , IDC: 3 makes Skype calls completely free of charge: are they crazy?
23 April 2009 by John Delaney – Research Director , IDC
Jean-Charles Barbou, PGP: Don’t mistake authentication and access controls for data protection
22 April 2009 by Jean-Charles Barbou, PGP
Alexandre Stern, President of Cryptolog: Paperless procedures and electronic signature: a major cost saving practice for companies when accompanied by a faultless security system
16 April 2009 by Alexandre Stern, President of Cryptolog
Andy Cowell, CensorNet: Is your business protected from prosecution under the new Pornography laws?
16 April 2009 by Andy Cowell, CensorNet
Mark Altman, CEO of Altman Technologies Ltd: Protection from God
16 April 2009 by Mark Altman, CEO of Altman Technologies Ltd
Doing More With Less: A Risk-Based, Cost-Effective Approach to Holistic Security
11 April 2009 by Ulf Mattsson, CTO, Protegrity Corporation
Alan Calder, IT Governance: Learn To Avoid Data Fiascos, Or Risk New FSA Penalties
8 April 2009 by Alan Calder, Chief Executive of independent information security experts IT Governance
Andrew Clarke, Senior Vice President, International, Lumension: The Salvation Army finds Sanctuary in Whitelisting Software
8 April 2009 by Andrew Clarke, Senior Vice President, International, Lumension
Ari Takanen, Codenomicon: A Friendly Reminder: Compliance Does Not Equal Security
8 April 2009 by Ari Takanen, Founder and CTO of Codenomicon
Alastair Molyneux, Kroll Ontrack: Cradle to Grave – data recovery 2.0
8 April 2009 by Alastair Molyneux, Business Development Manager at Kroll Ontrack
Elizabeth Ireland, nCircle : Agentless Comes of Age, Centralized Administration Enables Agentless Technologies
8 April 2009 by Elizabeth Ireland, Vice President, Marketing at nCircle
Steve Hall, Kingston Technology: Data Security, We Need More Education
8 April 2009 by Steve Hall, EMEA Branded Product Manager at Kingston Technology
Your podcast HereNew, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr
All new podcasts