Mirko Zorz
Infosecurity transformation and building proactive mitigation strategies
Marcos Christodonte II, CISO at Unqork, spent his career leading information security for large, complex enterprises. His focus on information security began when he served in …
New infosec products of the week: April 9, 2021
VMware increases visibility, enables compliance and enhances security for containerized applications VMware unveiled expanded cloud workload protection capabilities to deliver …
New infosec products of the week: April 2, 2021
Elastic Security 7.12 accelerates threat hunting workflows and prevents ransomware Elastic announced new updates across the Elastic Security solution in the 7.12 release to …
New infosec products of the week: March 26, 2021
Red Piranha’s Crystal Eye XDR 4.0 features advanced protection and threat detection Red Piranha launched Crystal Eye Extended Detection and Response (XDR) 4.0. They have taken …
(IN)SECURE Magazine issue 68 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 68 has been released today. It’s a free …
New infosec products of the week: March 19, 2021
Akamai MFA provides FIDO2 multi-factor authentication without hardware security keys Akamai Technologies announced the launch of Akamai MFA, a phish-proof solution designed to …
The challenges of keeping a strong cloud security posture
It’s simple – you can’t secure what you can’t see or don’t know about. In this interview, Badri Raghunathan, Director of Product Management for Container and Serverless …
Retail CISOs and the areas they must focus on
In this interview, Matt Cooke, cybersecurity strategist, EMEA at Proofpoint, discusses the cybersecurity challenges for retail organizations and the main areas CISOs need to …
New infosec products of the week: November 20, 2020
Group-IB launches Fraud Hunting Platform, a digital identity protection and fraud prevention solution Group-IB’s Fraud Hunting Platform analyzes each session and examines user …
How IoT insecurity impacts global organizations
As the Internet of Things becomes more and more part of our lives, the security of these devices is imperative, especially because attackers have wasted no time and are …
Finding 365 bugs in Microsoft Office 365
Microsoft 365 is used by over a billion users worldwide, so attackers are naturally deeply invested in compromising its security. One of the ways of making sure this suite of …
New infosec products of the week: November 6, 2020
Qualys Container Runtime Security: Defense for containerized applications Qualys Runtime Container Security, once instrumented in the image, will work within each container …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security