6 C
London
Monday, November 20, 2017
Demonstration of Apple Pay
Eleanor Dallaway, Editor & Associate Publisher Infosecurity Magazine discusses her highlights & thoughts from Day 1 at Infosecurity Europe
Day 1 from #infosec14 - Security as a Business Enabler
A quick look at the Thales stand and the wider exhibition at Earl's Court.
Jan Valcke, President & COO, Vasco Data Security tells us why authentication is important in today's marketplace and how Thales benefits his business.
Anders Henrikson, SVP Global Sales, Verisec stopped by the Thales stand to talk to us about cloud requirement trends.
Mark Read, Regional Channels Manager EMEA, Voltage Security talks to us about Voltage and its partnership with Thales, as well as changes he's seen in the data protection market.
Interview with Peter Gibbons, Head of Information Security, Network Rail, panellist in the Keynote Theatre at Infosecurity Europe 2013. Peter shares some of the highlights of the session on Securing critical national infrastructure: Cyber security strategies for SCADA, industrial...
The future of information security is changing, as the technologies we have are becoming more advanced and permeating deeper into our everyday lives. We must clearly identify these threats so that we may continue to stay safe and protected...
Risk management is not a science... it's an art. To manage risk effectively, we need to understand how people feel about, and react to risk. Akamai's CISO Andy Ellis will talk about how research into the psychology of risk has...
Trustwave and the U.S. Secret Service will highlight cybercrime trends from forensic investigations compiled in the 2013 Trustwave Global Security Report. The presentation will discuss the lifecycle of attacks including criminal motivations behind attacks, techniques used to infiltrate organizations, data...
How much do you know? The answer to that simple question makes all the difference when determining if your organization is prepared to defend itself against an advanced threat. This segment explores the concept of Threat Intelligence and why it...