
Yogi Chandiramani, Blue Coat: Application Visibility and Understanding, The Key to Network Cost Containment and Optimization
23 September 2009 by Yogi Chandiramani, Technical Director, Blue Coat
7 Easy Ways to Prevent Computer and Data Theft
15 September 2009 by
Simultaneously protecting applications and data: The next evolution in security?
14 September 2009 by Imperva
Calum Macleod, Regional Director Tufin Technologies, Bye Bye Baby
11 September 2009 by TUFFIN
Nathan Collins, CommVault : Disaster 101 – better business continuity with unified data management
10 September 2009 by Nathan Collins, Technical Director, CommVault
Nick Lowe, Check Point : Taking the Shield to Protect Mobile Computing
3 September 2009 by Nick Lowe, Check Point’s Regional Director for Northern Europe
Intego: How the Anti-Malware Function in Apple’s Snow Leopard Works
2 September 2009 by Intego Security Alert
Network automated tools don’t put humans out of jobs
2 September 2009 by Rory Nolan, Director, TADASoft
Origin Storage says hard disks will be boosted by Intel’s Braidwood
2 September 2009 by Marc Jacob
Chris Farey, StorMagic: Unlocking VMware® ESX with a Storage Virtual Appliance
28 August 2009 by Chris Farey, co-founder and CTO, StorMagic
Sean Glynn, Credant Technologies: Could your mobile device land your CEO in court?
27 August 2009 by Sean Glynn, Credant Technologies
Infosecurity Adviser blogger asks CPS to `take one for the team’ in Gary McKinnon case
24 August 2009 by Marc Jacob
Cyber-Ark: 1.7 million reasons for local authorities to use privileged data access
14 August 2009 by Cyber-Ark
Tufin: compliance does not guarantee security
5 August 2009 by TUFFIN
Mark Fullbrook, Cyber-Ark Software: Loyal Employees or Snooping Staff? You Decide
31 July 2009 by Mark Fullbrook, UK Director – Cyber-Ark Software
What links Twitter, stolen bikes and the Boston Police Department? answer by Mike Barwise, Infosecurity Adviser
23 July 2009 by
Ian Kilpatrick, chairman Wick Hill Group: Data Leakage – Planning To Fail
23 July 2009 by Ian Kilpatrick, chairman Wick Hill Group
Finland: New Tech haven
20 July 2009 by Annabelle Richard and Andreea Sabin, Ichay & Mullenex Avocats
Cyber-Ark says Microsoft’s Gazelle Web browser project may prove the answer to vagaries of the Internet
14 July 2009 by Cyber-Ark
David Poellhuber, ZEROSPAM: An improper use of SPF can make you block your own email
29 June 2009 by Marc Jacob
Google’s Anti-Malvertising.com Site Launch Welcomed by Finjan
24 June 2009 by Finjan
ISACA Commends EC Plans for Tougher Cybercrime Legislation
16 June 2009 by ISACA
Phil Jones,Shoden Data Systems UK: Three technologies for building a credit crunch-busting storage strategy
10 June 2009 by Phil Jones, CTO at Shoden Data Systems UK
Adam Bosnian, Cyber-Ark Software: “The Security/Privacy Paradox” – getting it right!
8 June 2009 by Adam Bosnian, VP of Products, Strategy & Sales at Cyber-Ark Software
Ian Kilpatrick, Wick Hill Group: Ten Tips To Keep IT Security Costs Down In The Recession
3 June 2009 by Ian Kilpatrick, chairman of security specialist Wick Hill Group
Ulf Mattsson, Protegrity Corp. : A Realistic, Cost-Effective Approach for Securing Data Throughout Its Lifecycle
2 June 2009 by Ulf Mattsson, CTO, Protegrity Corporation
A Help Button Needed on Every Website According to ISAF
1 June 2009 by ISAF
Your podcast HereNew, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr
All new podcasts