Mirko Zorz
Interview with Eric Greenberg, author of “Mission-Critical Security Planner: When Hackers Won’t Take No for an Answer”
Who is Eric Greenberg? I’ve been kicking around the Internet for quite a while. Around 1981, while in college, I worked at the National Institutes of Health as a …
Interview with Aviel Rubin, Computer Science Professor at Johns Hopkins University and Technical Director of the JHU Information Security Institute
Introduce yourself. My name is Avi Rubin. I am a Computer Science Professor at Johns Hopkins University and Technical Director of the JHU Information Security Institute. I …
Interview with Cyrus Peikari, CEO of AirScanner Mobile Security
Dr. Peikari is the CEO of AirScanner Mobile Security and co-author of the book “Maximum Wireless Security” from SAMS Publishing. He finished his formal training …
Interview with Judy Novak, co-author of “Network Intrusion Detection 3/e”
Introduce yourself. I’m currently a senior security analyst for a consulting firm – Jacob and Sundstrom, but I’ll be changing jobs in about a month to become …
Interview with Ed Skoudis, author of “Counter Hack”
Introduce yourself. Hello. This is Ed Skoudis, security geek. How did you get interested in computer security? I’ve always loved to tear things apart. As a child, I …
Maximum Wireless Security
While wired networks have been around for ages and have had the time to make good security defences, wireless networks and new in comparison and still have a long way to go. …
Interview with Adam N. Bosnian, Vice President, Sales and Marketing of Elron Software
Adam N. Bosnian joined Elron Software in May 2000. Bosnian brings a strong background in sales, strategy development, corporate partnering, marketing communications, product …
Interview with Martin Croome, European General Manager of Socket Communications
Mr. Croome has held technical and marketing positions within the IT industry for the last 15 years including 11 years with Hewlett Packard in a number of different business …
Interview with Rich Bowen, co-author of Apache Administrator’s Handbook
Hi. I’m Rich Bowen. I live in Lexington, Kentucky, and have been in this area for about 15 years. In addition to the time that I spend on geek pursuits, I enjoy hiking …
NAI Unveils ‘InfiniStream Security Forensics’ Solution
InfiniStream Security Forensics is a forensics analysis solution that allows enterprise customers worldwide to reconstruct, understand and prevent harmful network activity and …
Interview with Charles R. Elden, co-author of “Wireless Security and Privacy”
Charles R. Elden is an independent security consultant. He has worked as a manager and software security consultant with Cigital’s Software Security Group. He has …