Mirko Zorz
New infosec products of the week: October 30, 2020
Confluera 2.0: Enhanced autonomous detection and response capabilities to protect cloud infrastructure Confluera XDR delivers a purpose-built cloud workload detection and …
MDR service essentials: Market trends and what to look for
Mark Sangster, VP and Industry Security Strategist at eSentire, is a cybersecurity evangelist who has spent significant time researching and speaking to peripheral factors …
New infosec products of the week: October 23, 2020
Deepwatch Lens Score: SecOps maturity planning and benchmarking Deepwatch Lens Score allows CISOs to quickly understand data source collection, active analytics, and what …
What is confidential computing? How can you use it?
What is confidential computing? Can it strengthen enterprise security? Nelly Porter, Senior Product Manager, Google Cloud and Sam Lugani, Lead Security PMM, Google Workspace …
New infosec products of the week: October 16, 2020
Cyborg Security launches HUNTR platform to help orgs tackle cyber threats Cyborg Security’s HUNTR platform provides advanced and contextualized threat hunting and detection …
GitHub envisions a world with fewer software vulnerabilities
After five months in beta, the GitHub Code Scanning security feature has been made generally available to all users: for free for public repositories, as a paid option for …
New infosec products of the week: October 9, 2020
Checkmarx provides automated security scans within GitHub repositories Checkmarx announced a new GitHub Action to bring comprehensive, automated static and open source …
How do I select a data storage solution for my business?
We live in the age of data. We are constantly producing it, analyzing it, figuring out how to store and protect it, and, hopefully, using it to refine business practices. …
New infosec products of the week: October 2, 2020
Cohesity SiteContinuity: Protecting business-critical apps across a single platform Cohesity SiteContinuity is an automated disaster recovery solution that is integrated with …
Hardware security: Emerging attacks and protection mechanisms
Maggie Jauregui’s introduction to hardware security is a fun story: she figured out how to spark, smoke, and permanently disable GFCI (Ground Fault Circuit Interrupter – …
Plan for change but don’t leave security behind
COVID-19 has upended the way we do all things. In this interview, Mike Bursell, Chief Security Architect at Red Hat, shares his view of which IT security changes are ongoing …
How do I select a remote workforce protection solution for my business?
Recent research shows almost three quarters of large businesses believe remote working policies introduced to help stop the spread of COVID-19 are making their companies more …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security