Mirko Zorz
Interview with Adam N. Bosnian, Vice President, Sales and Marketing of Elron Software
Adam N. Bosnian joined Elron Software in May 2000. Bosnian brings a strong background in sales, strategy development, corporate partnering, marketing communications, product …
Interview with Martin Croome, European General Manager of Socket Communications
Mr. Croome has held technical and marketing positions within the IT industry for the last 15 years including 11 years with Hewlett Packard in a number of different business …
Interview with Rich Bowen, co-author of Apache Administrator’s Handbook
Hi. I’m Rich Bowen. I live in Lexington, Kentucky, and have been in this area for about 15 years. In addition to the time that I spend on geek pursuits, I enjoy hiking …
NAI Unveils ‘InfiniStream Security Forensics’ Solution
InfiniStream Security Forensics is a forensics analysis solution that allows enterprise customers worldwide to reconstruct, understand and prevent harmful network activity and …
Interview with Charles R. Elden, co-author of “Wireless Security and Privacy”
Charles R. Elden is an independent security consultant. He has worked as a manager and software security consultant with Cigital’s Software Security Group. He has …
Interview with David W. Chapman, President and Principal Consultant for SecureNet Consulting
David W. Chapman Jr. is President and Principal consultant for SecureNet Consulting, LLC, an independent information security consulting firm in Beaverton, OR. SecureNet …
Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses
If you're in charge of the security of a network or just a security enthusiast, you'll find this book of great value. The specific tools and techniques described in this book …
Interview with Dr. Nicko van Someren, CTO of nCipher
nCipher’s CTO Dr. Nicko van Someren leads the research team and directs the technical development of nCipher products. Nicko has 20 years of experience in cryptography, …
Interview with Ratmir Timashev, CEO of Aelita Software
Ratmir Timashev brings a rare combination of business savvy and technical knowledge to his role as CEO of Aelita Software, allowing him to create a vision for the company that …
Interview with Donald L. Pipkin, Information Security Architect for the Internet Security Division of Hewlett-Packard
Who is Donald L. Pipkin? I am an Information Security Architect at Hewlett-Packard. I’ve been with HP eighteen years; most of that time I have spent in the area of …
Cisco Secure PIX Firewalls
The authors state that the goal of this book is help users refresh their knowledge of basic PIX operation as well as to dwell into more advanced configurations. Do they …
PKWARE and RSA Security Enter a Strategic Alliance
Bringing together PKWARE’s ZIP compression technology and RSA BSAFE encryption technology, the two companies will develop and market best-of-breed products that combine …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility