Mirko Zorz
Lessons learned from RSA Conferences
In this video, Philippe Courtot, the Chairman and CEO of Qualys, offers insight into the past and present of the RSA Conference. He talks about how it has been growing and how …
Q&A: Google hacking
Robert Abela is a Technical Manager at Acunetix and in this interview he discusses the importance of Google for security research, provides tips on Google for information …
Q&A: Malware analysis
Greg Hoglund is the CEO and Founder of HBGary. He has been a pioneer in the area of software security. After writing one of the first network vulnerability scanners, he …
Q&A: InfoSec World Conference
Dina Dvinov is the Conference Marketing Manager at the MIS Training Institute and in this interview discusses the InfoSec World Conference. Introduce InfoSec World Conference …
Backup WordPress automatically with Backupify
You backup your computer, but do you backup your online activities? The typical Internet user nowadays uses a variety of services such as Flickr or Twitter, runs a WordPress …
Q&A: SOURCE Conference
Stacy Thayer is the Founder and Executive Director of SOURCE Conferences. Prior to founding SOURCE Conferences, Stacy was employed for a Fortune 500 company, where she worked …
Cybercriminals focus on targeted attacks
When it comes to computer security, bad news usually follows even the rare positive statistic. In their latest report, Websense note that they’ve seen the number of …
Q&A: Hackers and experimental artists
The “Noise vs. Subversive Computing” project is a collaborative release between noise and experimental artists working with subversive technologists and computer …
Adobe hacked, China to blame
In what seems to be normal news this week, Adobe became a victim of what the company is calling “a sophisticated, coordinated attack” and is actively investigating …
Google hacked, plans to leave China
Although it does face a variety of cyber attacks on a regular basis, Google recently acknowledged the theft of intellectual property following a sophisticated attack on their …
Q&A: Cyber threats
Mohd Noor Amin is the Chairman of IMPACT and heads the world’s largest public-private partnership against cyber threats. In this interview, he discusses the issues …
Q&A: Security testing methodologies
Jon Clay is the Senior Core Technology Marketing Manager at Trend Micro and in this interview he discusses current testing methodologies in the security industry, their good …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security