Mirko Zorz
Q&A: Splunk
In this interview the Splunk team discusses Splunk in detail. What is Splunk? Splunk was born from its founders’ frustration in running some of the worlds largest IT …
BruCON: Hackers descend on Belgium
After visiting several computer security events and being impressed by the energy and the open exchange of knowledge, a small group of people dreamed of creating a hacker …
Dissecting the hack: the f0rb1dd3n network
In this video, recorded last week at BruCON, Jayson Street talks about his book – “Dissecting the hack: the f0rb1dd3n network” – published by Syngress. …
Photos: BruCON conference, part 2
Help Net Security editor-in-chief Mirko Zorz is attending BruCON and besides Tweeting via our main account (@helpnetsecurity), he is right now recording a series of videos, as …
Q&A: Information assurance
Ravinderpal “Ravi” Sandhu is The University of Texas at San Antonio (UTSA)’s Lutcher Brown distinguished chair in cyber security and the executive director …
Q&A: 1Password
Carl Slawinski is the Chief Evangelist for Agile Web Solutions, the company behind 1Password, a hugely popular Mac software title. In this interview he takes us down memory …
Q&A: SQL injection
Justin Clarke is a co-founder and Director at Gotham Digital Science. He has over twelve years of experience in assessing the security of networks, web applications, and …
Q&A: Enterprise threats and compliance
John Viega is the CTO, Software-as-a-Service, at McAfee. John is author of many security books and is responsible for numerous software security tools and is the original …
Q&A: PCI compliance
Jim Bibles is a Product Manager at Qualys currently directing the development and enhancement of the company’s QualysGuard PCI solution. His security background ranges …
Q&A: Penetration testing
Thomas Wilhelm is an associate professor at Colorado Technical University and also employed at a Fortune 20 company performing penetration testing and risk assessments and has …
Q&A: OSSEC, the open source host-based intrusion detection system
Daniel B. Cid is the founder of the open source OSSEC HIDS and a principal researcher at Trend Micro. He has a special interest in intrusion detection, log analysis and secure …
Q&A: Vulnerability management
Eric Perraudeau is the product manager for QualysGuard vulnerability management (VM) solutions. Prior to Qualys, Eric was a security engineer at Accor and Morse in France. In …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security