This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Nearly five years after the terrorist attacks of September 11, 2001, the number one challenge perplexing security professionals and organizations seeking to execute successful security programs, business continuity and/or risk
And with it, your Business Magazine – designed by and for today’s security executive. You spoke and we listened. During focus groups, roundtables and one-on-one meetings, you shared your need
Mark McCourtAfter listening to many of you, visiting with top enterprise security executives, hearing from respected researchers and authorities, there was nothing I wanted to do more this year than
We have lots of partnerships (with the UAE). This issue that came up was a firestorm more out of the ignorance of all the facts than anything else,’’ Senator Johnny
Mark McCourtHenry Ford was asked why he didn’t research demand for the automobile before building the first automotive assembly line. His answer, “Because they would have asked for faster horses.”
If you haven’t been, the Consumer Electronics Show – 2006 CES International aimed at “Defining Tomorrow’s Technology” – is the ultimate digital playground for music, video and gadgetry. It’s both