Mirko Zorz
Q&A: Enterprise threats and compliance
John Viega is the CTO, Software-as-a-Service, at McAfee. John is author of many security books and is responsible for numerous software security tools and is the original …
Q&A: PCI compliance
Jim Bibles is a Product Manager at Qualys currently directing the development and enhancement of the company’s QualysGuard PCI solution. His security background ranges …
Q&A: Penetration testing
Thomas Wilhelm is an associate professor at Colorado Technical University and also employed at a Fortune 20 company performing penetration testing and risk assessments and has …
Q&A: OSSEC, the open source host-based intrusion detection system
Daniel B. Cid is the founder of the open source OSSEC HIDS and a principal researcher at Trend Micro. He has a special interest in intrusion detection, log analysis and secure …
Q&A: Vulnerability management
Eric Perraudeau is the product manager for QualysGuard vulnerability management (VM) solutions. Prior to Qualys, Eric was a security engineer at Accor and Morse in France. In …
Q&A: Windows forensics
Harlan Carvey, CISSP, is a computer security engineer and book author. He has conducted penetration tests and vulnerability assessments in support of corporate and federal …
Q&A: Dasient and current threats
Ameet Ranadive is a co-founder of Dasient, an Internet security company that protects websites from web-based malware attacks. In this interview he introduces his team at …
Q&A: Privacy and anonymity with Tor
Andrew Lewman is executive director of The Tor Project, a non-profit organization providing research and free software that protects your online privacy and anonymity. He is a …
Q&A: Cain & Abel, the password recovery tool
Massimiliano Montoro is the mastermind behind Cain & Abel, the password recovery tool for Windows. In this interview he provides insight on the history of the tool, the …
Q&A: The Kantara Initiative and the global identity landscape
Roger Sullivan serves as president of the Kantara Initiative Board of Trustees and president of the Liberty Alliance Management Board. He is vice president, Oracle Identity …
Q&A: L0phtCrack 6
In this interview, L0phtcrack core team member Chris Wysopal discusses the history of this legendary password auditing and recovery tool as well as the features in the latest …
Q&A: Backup challenges
Stephen Aldous is a technical specialist on all of Iron Mountain Digital’s solutions providing prospects and customers with in-depth consulting and technical knowledge. …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility