Mirko Zorz
RSA breach: Reactions from the security community
RSA, the security division of EMC, has suffered a breach and data loss following an “extremely sophisticated cyber attack.” Their investigation revealed that the …
Cenzic at a glance
John Weinschenk, President & CEO of Cenzic, talks about the company and their product line. Cenzic is a provider of software, managed service, and cloud security products …
Penetration testing and certification
Stephen Sims works at Wells Fargo in San Francisco as a security architect and is a certified instructor for the SANS Institute. In this interview he discusses the …
The fundamental failure of endpoint security
According to Stefan Frei, Research Analyst Director with Secunia, it’s not the vulnerabilities in Microsoft’s products we should worry about, but those in …
SANS Secure Europe training
Gareth Dance is the Manager EMEA for the SANS Institute. In this interview he discusses the SANS Secure Europe Amsterdam 2011 training event and offers insight into what …
Vulnerability scanning and research
Cristian Florian is a product manager at GFI Software in charge of GFI LANguard, a network security scanning and patch management solution. In this interview he discusses …
Securing the enterprise: Insight from Qualys
In this video, recorded at RSA Conference 2011 in San Francisco, Qualys Chairman and CEO Philippe Courtot talks about the myriad of innovations coming from the company: Next …
The complex world of endpoint security
Jeff Melnick is a Sales Engineer at NetWrix Corporation and in this interview discusses the intricate world of endpoint security, offers tips for IT security managers dealing …
Secunia’s role in vulnerability management
In the video below, Secunia CSO Thomas Kristensen talks about the company and their product line. Kristensen tackles the following questions: Tell us more about Secunia, and …
The importance of identity in the digital age
In the past decade our identity has undeniably evolved, we’re preoccupied with identity theft and authentication issues, while governments work to adopt open identity …
How to protect your company from social engineering attacks
Jayson E. Street is the Chief Infosec Officer at Stratagem 1 Solutions, the author of the book Dissecting the hack: the f0rb1dd3n network and a well-known information security …
L0phtCrack 7: The next level of password auditing and recovery
L0phtCrack is one of the most used tools by security professionals worldwide. After years of inactivity, version 6 was released in 2009 and development hasn’t halted …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users