Mirko Zorz
Key cloud computing trends and enterprise security
Dan C. Marinescu is the author of Cloud Computing: Theory and Practice. He was a Professor of Computer Science at Purdue University in West Lafayette, Indiana from 1984 till …
Security intelligence through configuration auditing
Modern systems have a multitude of configuration elements that, ideally, meet the IT business requirements of the organization. The danger of having poorly configured systems …
Cloud Computing: Theory and Practice
Once a buzzword, cloud computing is now a part of nearly every modern IT infrastructure. Despite a variety of privacy, security and compliance concerns, companies large and …
Network Intrusion Analysis
What happens after a network intrusion is detected? What steps do you need to take? What is the proper way to react in a specific situation? The authors say their intention …
Jon Callas on privacy in the modern age
In this interview, Jon Callas, co-founder of PGP and current CTO at Silent Circle, discusses the global erosion of privacy and the importance of confidentiality. He tackles …
Can you trust your online backup service?
While having lots of digital storage space at your physical location may be cheap nowadays, it’s also very useful to have offsite backups – not only in the event …
Chat securely on Facebook with Synapsid
Synapsid is an iOS app that promises an encrypted chat experience on Facebook. In addition to having secure conversations, Synapsid allows you to: view friends profiles, …
How big data is transforming information security
In this video recorded at Hack In The Box 2013 Amsterdam, Eddie Schwartz, CSO at RSA, The Security Division of EMC, discusses the impact of big data on information security. …
DDoS attacks: What they are and how to protect yourself
Ameen Pishdadi is the CTO at GigeNET. In this interview he discusses the various types of DDoS attacks, tells us who is at risk, tackles information gathering during attacks, …
BYOD: The why and the how
Brad Keller and Robin Slade are Senior Vice Presidents at The Santa Fe Group. In this interview they talk in detail about the challenges involved in evaluating, deploying and …
Instant Apple Configurator How-to
Apple Configurator is a tool used for the mass configuration of iOS devices. With many large organizations adapting a variety of iOS devices into their daily workflow, it's …
Information security executives need to be strategic thinkers
George Baker is the Director of Information Security at Exostar. In this interview he talks about the challenges in working in a dynamic threat landscape, offers tips for …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility