Mirko Zorz
Teaching children information security skills
In this interview, Julie Peeler, the Director of the (ISC)2 Foundation, discusses the biggest online threats to kids and provides tips on how to teach children to stay safe …
Tracking botnets using automatically generated domains
Stefano Zanero is an Assistant Professor at Politechnico di Milano, where he focuses on systems security. Modern botnets rely on domain-generation algorithms (DGAs) to build …
The Circle
The book talks about a near future where the most significant company in the world is The Circle. They don't deal in goods, but in what we all know is the real commodity of …
The future? Big data and intelligence driven security
As we produce and consume an increasing amount of digital data, even the casual user is becoming aware that the way we store and access this data will continue to shift and …
A primer on breaking game console security
Are you interested to learn about the delicate hacks and tricks that go on behind the curtains of the scene better known as the console hacking scene? In this podcast recorded …
Facebook data mining tool uncovers your life
You know you shouldn’t post potentially damaging data on Facebook, but more often that not, your friends don’t think twice about it, and this can impact you even …
Innovation, big data and the future of information security
Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences and a world-renowned expert on IT security. He has co-authored several books on the topic and has written more …
1Password 3.9.6: Manage passwords or die trying
While it is available for other platforms, 1Password is probably the most popular password manager for the Mac. It also integrates into your browser to make website logins …
Smart building security: Threats, tips and tricks
Martin Lee is the Technical Lead, Threat Intelligence at Cisco. In this interview he discusses the critical security threats to smart buildings, the features of a robust and …
Computation and Storage in the Cloud: Understanding the Trade-Offs
These days, especially in the IT world, most people are familiar with the concept of cloud computing and they take advantage of it for a variety of personal and business …
The erosion of privacy in the digital world
Yves Le Roux is the Technology Strategist at CA Technologies and Chair of ISACA’s Data Privacy Task Force. In this interview he discusses the evolution of the digital …
Exploring critical infrastructure security and government cyber security
Chris Folk is the Director of National Protection Portfolio, The MITRE Corporation. Folk oversees work program development and delivery to: the DHS National Protection and …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility