Mirko Zorz
Demystifying cloud computing security
Phil Neray is the VP, Data Security Strategy, InfoSphere Guardium & Optim at IBM. In this interview Phil talks about the complex issues surrounding cloud computing …
How well do you know SSL?
Ivan Ristic, the Director or Engineering at Qualys, talks about the research done by SSL Labs. SSL Labs is a collection of documents, tools and thoughts related to SSL. …
SecurityByte: India’s largest security conference
Nishchal Bhalla is the founder of SecurityByte Conference as well as security companies SD Elements and Security Compass. In this interview, he introduces India’s …
Next generation security as a service
In this video recorded at Black Hat 2011 in Las Vegas, Sumedh Thakar, Vice President of Engineering at Qualys, talks about QualysGuard Web Application Scanning (WAS) 2.0, the …
Digital forensics: The inside story
Jelle Niemantsverdriet is the Principal Consultant, Forensics and Investigative Response EMEA, Verizon Business Security Solutions. In this interview he introduces the reader …
Microsoft offers $250,000 reward for botnet information
Microsoft decided to extend their efforts to establish the identity of those responsible for controlling the Rustock botnet by issuing a $250,000 reward for new information …
Email archiving challenges
Brian Azzopardi is the product manager for GFI MailArchiver. In this interview he discusses the challenges related to managing email growth and how archiving can help. Why …
Securing the virtual environment
In this video, Dimitri McKay, Security Architect at LogLogic, talks about vulnerabilities and the security challenges surrounding virtual environments: hyperjacking, VM …
The complex information security landscape
In this interview, Latha Maripuri, Director, IBM Security Services and Marc van Zadelhoff, Director of Strategy, IBM Security Solutions, discuss the increasingly complex …
Application security vulnerabilities
Rafal Los, Application Security Evangelist at HP Software, talks about application security vulnerabilities at the logic level. The inner-workings of an application can only …
Social media threats and targeted attacks
In the video below, Alexandru Catalin Cosoi, the Head of Online Threats Lab at BitDefender, talks about the new breed of social media threats and sophisticated targeted …
Security auditing tools and challenges
James Tarala is a principal consultant with Enclave Security. He is a regular speaker and senior instructor with the SANS Institute as well as a courseware author and editor …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security