Mirko Zorz
Interview with Kurt Sauer, CSO of Skype
As Chief Security Officer at Skype Technologies, Kurt Sauer is focused on delivering trusted communications services via Skype’s platforms. Both the software delivered …
Jay Bavisi, President of EC-Council, on Ethical Hacking
We met with Jay Bavisi, President of EC-Council, at the RSA Conference 2007 in San Francisco. In this 07:20 video he talks about ethical hackers, the importance of …
Microsoft Chief Security Advisor Discusses Security Challenges and Windows Vista
Last week in London at the Infosecurity press conference, Ed Gibson, the Chief Security Advisor at Microsoft, shared his views on the security challenges the Redmond giant is …
Interview with Mads Lillelund, CEO of Bluesocket
Mads Lillelund is the CEO of Bluesocket, the leader in open wireless security and management solutions that simplify the complexities of mobile enterprises. In this interview …
Computer Security in 2007: A Report From The Infosecurity Europe Press Conference
With an announced 300 exhibitors (90 out of the UK), Infosecurity 2007 is definitely the largest gathering of principal vendors in Europe. Launched as a UK event in 1996, this …
Interview with Balazs Fejes, CTO of EPAM Systems
Balazs Fejes joined EPAM Systems in 2004, when Fathom Technology merged with EPAM Systems. Prior to co-founding Fathom Technology Mr. Fejes was a chief software architect/line …
Q&A with Amichai Shulman on the Critical Vulnerability in AJAX Technology
Recently, the Imperva Application Defense Center announced the discovery of a critical vulnerability in DWR (Direct Web Reporting), a key underlying technology in the AJAX web …
Interview with Marc Vaillant, CEO of Criston
Since the start of his career, Marc Vaillant has always worked in the high-tech sector, holding positions in companies of various sizes. Before joining Criston, he was Chief …
Interview with Vladimir Katalov, CEO of ElcomSoft
Vladimir Katalov is working in ElcomSoft from the very beginning. He created the first program the password recovery software line has started from: Advanced ZIP Password …
Essential Security Software for Mac OS X Users
There’s a plethora of Mac OS X security software available but some have proven to be quite exceptional and essential for anyone interested in computer security. Here is …
Microsoft Patch Tuesday Brings Eight Critical Vulnerabilities
Microsoft alerted us this time about 12 vulnerabilities of which eight were rated critical, three important and one moderate. Here comes another cumulative security update for …
Interview with Kenny Paterson, Professor of Information Security at Royal Holloway, University of London
The Information Security Group at Royal Holloway is one of the world’s largest academic research groups in information security, with about 15 permanent academic staff, …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility