Mirko Zorz
Behind the scenes and inside workings of a CERT
Brian Honan is the founder and head of Ireland’s first Computer Emergency Response Team (CERT) team as well as owner of BH Consulting. In this interview he discusses the …
Malware detection with Neptune
In this video recorded at Black Hat USA 2010, Rami Kawach, a software architect at Qualys, talks about Neptune – a project to build an automatic malware analysis engine …
SSL Labs: Researching the technology that protects the Internet
In this video recorded at Black Hat USA 2010, Ivan Ristic talks about SSL Labs – a non-commercial research effort and collection of documents and tools related to SSL. …
Security B-Sides: The anti-conference
Security B-Sides is a DIY, open security conference that is free to all attendees. These events are corporate sponsored, centrally managed (though locally organized) and do …
BlindElephant: Open source web application fingerprinting engine
In this video recorded at Black Hat USA 2010, Patrick Thomas, a vulnerability researcher at Qualys, discusses the open source web application fingerprinting engine …
Q&A: Strong authentication
Mike Moir is a Product Manager for the Entrust IdentityGuard solution. In this interview he talks about strong authentication. Based on your experience, how critical is …
Secure by design
In this video recorded at the IBM Innovate 2010 conference, David Grant, the Director of Security Solutions at IBM Rational, talks about how software is the invisible thread …
Q&A: Sandbox for Adobe Reader
Didier Stevens is an IT security consultant well-known for his research into malicious PDF files. Since Adobe announced a sandbox for Adobe Reader, it was a perfect …
Q&A: BruCON security conference
Sebastien Deleersnyder is an OWASP Foundation board member and one of the organizers of the BruCON security conference in Belgium. In this interview, he discusses this …
Q&A: Infosecurity Russia. Storage Expo. Documation 2010
Alexandr Vlasov is a recognized expert in information security and personal data, working as a Business Development Executive at Groteck Business Media. In this interview he …
Q&A: Phishing explained
Dr. Jason Hong is the CTO and co-founder of Wombat Security Technologies, a provider of cyber-security training and filtering solutions. In this interview he discusses …
Q&A: Symantec’s acquisitions and the future
Francis deSouza is senior vice president of the Enterprise Security Group at Symantec. In this interview he discusses Symantec’s recent acquisitions, how they mitigate …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users