Mirko Zorz
![Michelle Weston](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/07131207/michelle_weston-2-kyndryl-400x200.webp)
Leveraging AI and automation for enhanced security operations
In this Help Net Security interview, Michelle Weston, VP of Security & Resiliency at Kyndryl, discusses the key challenges in security operations and how to address them. …
![Gitleaks](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/22164528/gitleaks-1500-400x200.webp)
Gitleaks: Open-source solution for detecting secrets in your code
Gitleaks is an open-source SAST tool designed to detect and prevent hardcoded secrets such as passwords, API keys, and tokens in Git repositories. With more than 15 million …
![Morgan Wright](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17133906/morgan_wright-2-sentinelone-400x200.webp)
Future trends in cyber warfare: Predictions for AI integration and space-based operations
In this Help Net Security interview, Morgan Wright, Chief Security Advisor at SentinelOne, discusses how AI is utilized in modern cyber warfare by state and non-state actors. …
![Zeek](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/18165958/zeek-1500-400x200.webp)
Zeek: Open-source network traffic analysis, security monitoring
Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a …
![Kunal Modasiya](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24114524/kunal_modasiya-2-qualys-400x200.webp)
CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0
In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features, significant advantages, and innovative …
![Julianna Lamb](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/12095639/julianna_lamb-2-stytch-400x200.webp)
From passwords to passkeys: Enhancing security and user satisfaction
In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and …
![SELKS](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17154145/selks-stamust_networks-1500-400x200.webp)
SELKS: Open-source Suricata IDS/IPS, network security monitoring, threat hunting
SELKS is a free, open-source, turnkey solution for Suricata-based network intrusion detection and protection (IDS/IPS), network security monitoring (NSM), and threat hunting. …
![Alan Dekok](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/07131822/alan_dekok-2-networkradius-400x200.webp)
Enhancing security through collaboration with the open-source community
In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the …
![Hillary Baron](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/05115847/hillary_baron-2-cloud_security_alliance-400x200.webp)
The rise of SaaS security teams
In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge in organizations establishing dedicated …
![Mark Nelsen](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/05124651/mark_nelsen-2-visa-400x200.webp)
How businesses can integrate token technology into existing payment systems
In this Help Net Security interview, Mark Nelsen, SVP and Global Head of Consumer Product at Visa, discusses the integration of token technology into existing payment systems. …
![Jim Dolce](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/05134559/jim_dolce-2-lookout-400x200.webp)
Security and privacy strategies for CISOs in a mobile-first world
In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must …
![Radare](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/01182540/radare-1500-400x200.webp)
Radare: Open-source reverse engineering framework
Radare is an open-source UNIX-like reverse engineering framework and command-line toolset. It can be scripted, modified, and used for batch analysis. “I started the …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege