Mirko Zorz
Interview with Balazs Fejes, CTO of EPAM Systems
Balazs Fejes joined EPAM Systems in 2004, when Fathom Technology merged with EPAM Systems. Prior to co-founding Fathom Technology Mr. Fejes was a chief software architect/line …
Q&A with Amichai Shulman on the Critical Vulnerability in AJAX Technology
Recently, the Imperva Application Defense Center announced the discovery of a critical vulnerability in DWR (Direct Web Reporting), a key underlying technology in the AJAX web …
Interview with Marc Vaillant, CEO of Criston
Since the start of his career, Marc Vaillant has always worked in the high-tech sector, holding positions in companies of various sizes. Before joining Criston, he was Chief …
Interview with Vladimir Katalov, CEO of ElcomSoft
Vladimir Katalov is working in ElcomSoft from the very beginning. He created the first program the password recovery software line has started from: Advanced ZIP Password …
Essential Security Software for Mac OS X Users
There’s a plethora of Mac OS X security software available but some have proven to be quite exceptional and essential for anyone interested in computer security. Here is …
Microsoft Patch Tuesday Brings Eight Critical Vulnerabilities
Microsoft alerted us this time about 12 vulnerabilities of which eight were rated critical, three important and one moderate. Here comes another cumulative security update for …
Interview with Kenny Paterson, Professor of Information Security at Royal Holloway, University of London
The Information Security Group at Royal Holloway is one of the world’s largest academic research groups in information security, with about 15 permanent academic staff, …
Interview with Marc Shinbrood, President and CEO, Breach Security
Marc Shinbrood has more than 30 years of experience in information technology with the last 10 years dedicated specifically to the computer security industry. What do you see …
Experts Comment On The Top Security Threats In 2006
At the Infosecurity Europe 2006 Press Conference a panel of speakers from MessageLabs, Centennial Software, (ISC)2, Black Spider, Juniper Networks and Insight Consulting …
Microsoft Talks About Security Developments
Microsoft realized that phishing, pharming, botnets and rootkits show that attacks are becoming more sophisticated. This situation makes traditional defenses to be inadequate …
Convergence And The Rise Of Botnets
At the recent Infosecurity Press Conference in London, Mark Sunner, CTO of MessageLabs, presented the results of the MessageLabs Intelligence Annual Report that provides us …
Computer Security Today: A Report From The Infosecurity Europe 2006 Press Conference
Infosecurity Europe 2006 is just around the corner. Taking place at the Olympia in London 25-27 April 2006, it is the most important gathering of security professionals in …