Mirko Zorz
CEO hot seat: Dave Hansen
Recently SafeNet announced the appointment of Dave Hansen, an information security and cloud veteran, as the company’s new President and CEO. Help Net Security put him …
Investigating clever scamming techniques and their evolution
Christopher Boyd is a Senior Threat Researcher for GFI Software. Chris has been credited for finding the first instance of a rogue Web browser installing without permission, …
What makes a good information security professional?
Information security is a very competitive industry, and one of the very few that kept doing fine even during the recession. It’s also a dynamic field that promises a …
Dangerous remote Linksys 0-day root vulnerability discovered
DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. They contacted Cisco and shared a detailed …
Looking back at a year of Microsoft patches
Last year Microsoft’s Patch Tuesdays featured a total of 83 bulletins, which is a decline from previous years. Since their security efforts impact countless security …
BYOD challenges for large organizations
Alexander Hav?¤ng is the CTO at Procera Networks and in this interview explains enterprise challenges with BYOD. BYOD is one of the biggest buzzwords in recent years. In …
Phishing techniques, consequences and protection tips
In this interview, Rohyt Belani, CEO at PhishMe, illustrates the magnitude of the phishing threat. He discusses techniques, consequences and protection tips. What happens once …
Exploring data center design innovations
Douglas Alger is Cisco’s IT Architect for Physical Infrastructure. He develops architecture roadmaps, solutions and policies for the physical infrastructure of the …
Can you trust the cloud?
Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that cloud security issues (84.4%) and cloud privacy and compliance issues …
Microsoft’s worldwide threat assessment
In this podcast recorded at RSA Conference Europe 2012, Tim Rains, the Director of Product Management at Microsoft’s TWC group, talks about volume 13 of …
OS X Mountain Lion Pocket Guide
Since its release, OS X Mountain Lion has been hailed as the most advanced operating system coming out of Cupertino. With lots of new features and a myriad of small …
Security implications of the rise of silicon-based life forms
Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility