
IT security experts says Yasni research highlights case for encryption
2 February 2009 by Marc Jacob
David Ting, CTO, Imprivata: Desktop Virtualization – Has it hit your desk yet?
28 January 2009 by David Ting, CTO, Imprivata
A new trend in security: Secure Web Gateway in SaaS mode
28 January 2009 by Javier Peralta, Optenet Country Manager UK
Ulf Mattsson: Protecting SOA Against Internal Attacks
26 January 2009 by Ulf Mattsson, CTO, Protegrity Corporation
Effecting Change Now: Stimulating Your Organization with Green Technology
24 January 2009 by Lisa Voldeng
Craig Labovitz, Arbor Networks: The Great Obama Traffic Flood
23 January 2009 by Craig Labovitz, Arbor Networks
GSS warns that Cloud Computing may be safe harbour for malware
23 January 2009 by Marc Jacob
Mano Paul, (ISC) 2: Software Security: Being Secure in an Insecure World
22 January 2009 by Mano Paul, CISSP, MCAD, MCSD, CompTIA Network+, ECSA Software Assurance Advisor, (ISC) 2
Chris Schwartzbauer, Shavlik Technologies, LLC: Vulnerability Management -Battling the Unknowns with Intelligence
22 January 2009 by Chris Schwartzbauer, Vice president of development and customer operations, Shavlik Technologies, LLC
Ari Takanen, CTO, Codenomicon: Time of Proactive Security is Beginning!
22 January 2009 by Ari Takanen, CTO, Codenomicon
Stephen, AEP Networks: Protecting personal data - information assurance as a core business function of an organisation
22 January 2009 by Stephen Lewis, VP of Business Development, AEP Networks
David Hobson, Global Secure Systems: Into the Cloud we go.....have we thought about the security issues?
22 January 2009 by David Hobson, Managing Director, Global Secure Systems
Cloud-Based security services: Will 2009 be the year thsi much hyped sector comes of age?
21 January 2009 by Pravin Mirchandani, CEO of network security specialists Syphan
Bill Beverley, F5 Networks: Security Implications Of The Virtualised Datacentre
21 January 2009 by Bill Beverley - Security Technology Manager, F5 Networks
Chris Jones, Actify Europe Ltd: The importance of IP for Manufacturing Companies
21 January 2009 by Chris Jones, President of Actify Europe Ltd
Stephen Midgley, Absolute Software: How to avoid becoming the next data loss headline
21 January 2009 by Stephen Midgley, Absolute Software
Dr. Bernard Parsons, CEO, BeCrypt: ‘Classified Information’ … Can companies learn from Government?
21 January 2009 by Dr. Bernard Parsons, CEO, BeCrypt
David Amnizade, Tufin Technologies: Managing the Mergers & Acquisitions IT Nightmare in the Firewall Team
21 January 2009 by David Amnizade, Director Northern Europe, Tufin Technologies
David Dupré and Daniel Fages, CommonIT: A web browser “secure by design”
21 January 2009 by Marc Jacob
Andy Dalrymple, Global Secure Systems : 12 tips that IT security experts use to shop safely online
21 January 2009 by Andy Dalrymple – Managing Consultant - Information Risk Management, Global Secure Systems (GSS)
Ulf Mattsson, Protegrity Corporation: Web Application Firewalls and PCI DSS
17 January 2009 by Marc Jacob
Roger Hockaday, Aruba Networks, EMEA: WPA – Is Wireless Security ‘Cracked’?
16 January 2009 by Roger Hockaday, director of marketing, Aruba Networks, EMEA
Mark Fullbrook, Cyber-Ark: I.T.’s Dirty little secret – Privileged Passwords
12 January 2009 by Mark Fullbrook, UK and Ireland Director, Cyber-Ark
Alan Calder, IT Governance Limited: Invest in Information Security to beat downturn risks
10 January 2009 by Alan Calder, Chief Executive of IT Governance Limited
Trevor Dearing, Juniper Networks: Virtualization: What are the Key Steps?
10 January 2009 by Trevor Dearing, Portfolio Marketing Manager, Juniper Networks
Paul Kearney, BT Group: Protecting a business is as much to do with ‘human factors’ as it is with the IT department
10 January 2009 by Paul Kearney, Head of Enterprise Risk Research at BT Group
Greg Day, McAfee: Check your spelling, Mistyped URLs can land you in hot water explains
29 December 2008 by Greg Day, EMEA Security Analyst, McAfee
Alan Calder, IT Governance Limited: 9 Steps to halt Data Breaches
29 December 2008 by Alan Calder, Chief Executive of IT Governance Limited
Marc Hudavert, ActivIdentity: IT administrators go ‘rogue’, minimising the threat from inside
29 December 2008 by Marc Hudavert, vice-president and general manager of EMEA, ActivIdentity
Your podcast HereNew, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr
All new podcasts