Mirko Zorz

A look at modern adversary behavior and the usage of open source tools in the enterprise
Leszek Miś is the founder of Defensive Security, a principal trainer and security researcher with over 15 years of experience. Next week, he’s running an amazing online …

How do I select a network detection and response solution for my business?
Network detection and response (NDR) solutions enable organizations to improve their threat response, they help protect against a variety of threats, and also provide …

How do I select an application security testing solution for my business?
Software-related issues continue to plague organizations of all sizes, so IT leaders are turning to application security testing tools for help. Since there are many types of …

Tech businesses must rethink their IT infrastructure
Working life has changed drastically in recent months. Speedy digital transformation has been critical for business continuity and has been driving growth even during these …

Key cybersecurity industry challenges in the next five years
What key challenges will the cybersecurity industry be dealing with in the next five years? Pete Herzog, Managing Director at ISECOM, is so sure that artificial intelligence …

How do I select a SIEM solution for my business?
A Security Information and Event Management (SIEM) solution collects and analyzes activity from numerous resources across your IT infrastructure. A SIEM can provide …

Ransomware perspectives: The shape of things to come
Michael Hamilton, CISO of CI Security, has worked in the information security industry for 30 years. As former CISO for the City of Seattle, he managed information security …

How do I select a mobile security solution for my business?
The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the security …

Keep remote workers and their devices secure with one click
In this interview for Help Net Security, Shailesh Athalye, VP Compliance at Qualys, discusses cloud-based Remote Endpoint Protection and illustrates how security teams can …

How do I select a security awareness solution for my business?
“Great security awareness training, that is part of a healthy cyber security culture and that is aimed at encouraging positive security behaviours, is essential. The …

(IN)SECURE Magazine issue 66 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 66 has been released today. It’s a free …

New infosec products of the week: June 12, 2020
Qualys Remote Endpoint Protection gets malware detection, free for 60 days Powered by the Qualys Platform and Cloud Agent, malware detection in Remote Endpoint Protection uses …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act