Modern Listing Example
Uniting through oceans
Bolstered by its mighty surface, undersea and aerial capabilities, India’s blue water navy staged a…
Thinking before we click: the unseen face of online security
When Karen Stones left school at the young age of fifteen, she never imagined she…
Data Centres : A weak link in counter terrorism?
Many organisations have taken constructive action against terrorist attacks, through security screening, surveillance analytics, target…
The politics of protection and privacy
The privacy versus security debate is not just about rights and metadata retention laws but…
Know your enemy, but know yourself too
You can’t protect your company’s data if you don’t know where it is Information security…
Smarter Surveillance: Managing risk with business intelligence
The need for organizations to gather business intelligence has changed the face of risk management…
Trend Micro finalises acquisition of TippingPoint, includes next-gen IPS and award-winning zero day initiative
Trend Micro International has announced the close of an agreement to acquire TippingPoint from Hewlett Packard…
Three steps to designing an ‘inside out’ security strategy
External security threats are a top concern for most businesses, but threats that come from…