Mirko Zorz
Q&A: Strong authentication
Mike Moir is a Product Manager for the Entrust IdentityGuard solution. In this interview he talks about strong authentication. Based on your experience, how critical is …
Secure by design
In this video recorded at the IBM Innovate 2010 conference, David Grant, the Director of Security Solutions at IBM Rational, talks about how software is the invisible thread …
Q&A: Sandbox for Adobe Reader
Didier Stevens is an IT security consultant well-known for his research into malicious PDF files. Since Adobe announced a sandbox for Adobe Reader, it was a perfect …
Q&A: BruCON security conference
Sebastien Deleersnyder is an OWASP Foundation board member and one of the organizers of the BruCON security conference in Belgium. In this interview, he discusses this …
Q&A: Infosecurity Russia. Storage Expo. Documation 2010
Alexandr Vlasov is a recognized expert in information security and personal data, working as a Business Development Executive at Groteck Business Media. In this interview he …
Q&A: Phishing explained
Dr. Jason Hong is the CTO and co-founder of Wombat Security Technologies, a provider of cyber-security training and filtering solutions. In this interview he discusses …
Q&A: Symantec’s acquisitions and the future
Francis deSouza is senior vice president of the Enterprise Security Group at Symantec. In this interview he discusses Symantec’s recent acquisitions, how they mitigate …
Security+ SY0-201 Video Mentor
When I glance at my bookshelf, I see many certification titles racking up an imposing number of pages, and I keep wondering why there's so little interactive material …
Q&A: OWASP AppSec Research
John Wilander is the chapter leader for OWASP Sweden and expert consultant at Omegapoint AB. He’s working professionally in the intersection between software development …
Splunk.com password leak
Splunk announced on their blog that they discovered the logging of users’ passwords in clear text. The culprit is debug code that found its way onto the www.splunk.com …
iPhone OS 4.0 security fear, uncertainty and doubt
It is inevitable. With every mainstream technology news, comes at least one security company that wants to piggyback on it and introduce themselves to the world by making …
Web application security issues and solutions
In this video, recorded at RSA Conference 2010, Mandeep Khera from Cenzic talks about web application security issues and solutions. He focuses on the fact that most web …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility