• bank-building-icon

Financial infrastructures: a call to action for transparency
The Sustainability Summit calls for the community’s support to define the framework for a new globe-spanning initiative aiming to drive change and foster a paradigm shift in the world of finance...


  • Editorial
    Demand chain management is described as managing relationships between suppliers and customers to deliver the best value at the least cost. In the normal, legitimate run of things, this would undoubtedly bring economic benefit to all protagonists, but in the world of security, it does not necessarily mean monetary savings. It may be protecting the value of a life, a livelihood, a brand or an identity....


  • Regional approaches to competitiveness
    Of all key industries, manufacturing is among the first to have totally transitioned in light of a global playing field, with competitiveness hardly being defendable on the basis of pure technological supremacy: skills and expertise are easily transferrable and IP is difficult to protect....



  • DigitalCommunities_09Sep13_Afeat

    Changing public perception
    Hundreds of new cities will emerge over the next 20 years, while those already in existence will continue to grow. A study on the issues of safer cities and how urban leaders can draw community support for surveillance programs

  • Connecting modern enterprise
    An in-depth look into authentication factors, use cases and best practices for securing IT infrastructures and protecting them from data breaches

  • Protecting digital infrastructures
    A study on the requirement for a mix of well thought out policies and up-to-date technologies to protect digital infrastructures and their data in a mobile or portable context

  • Interview with Suvi Lindén, UN Broadband Commission
    Suvi Lindén, ITU Special Envoy from the UN Broadband Commission, expands on the deployment of broadband and how it is supporting the fight against crime through immediate access to networks and information

  • Connecting networks
    for public safety

    An exploration into how emergency services IP networkS (ESIN) and map based location technology can automatically locate and identify mobile device users