Mirko Zorz

December 2019 Patch Tuesday forecast: Make sure to deploy year-end updates
Can you believe another year has passed and we’re approaching the last Patch Tuesday of the year? While I get ready to make another online gift purchase with my credit card, I …

The hidden risks of cryptojacking attacks
For any business, privacy and security are a constant concern. The variety and velocity of attacks seeking to infiltrate corporate systems and steal vital business and …

New infosec products of the week: November 22, 2019
CyberSaint Governance Dashboard empowers CISOs to communicate compliance and risk posture in real-time CyberSaint Security announced significant updates to its Governance …

New infosec products of the week: November 15, 2019
Sysdig Secure 3.0 provides enterprises with threat prevention at runtime Sysdig Secure 3.0 includes an incident response and audit tool for Kubernetes, giving enterprises the …

Product showcase: SpyCloud Active Directory Guardian
Fueled by rampant employee password reuse across work and personal logins, account takeover represents a major risk to the enterprise. According to the 2019 Verizon Breach …

The password reuse problem is a ticking time bomb
Despite Bill Gates predicting the demise of passwords back in 2004, they are still very much in use. Passwords, like email, seem future proof; but they are also the source of …

New infosec products of the week: November 8, 2019
Waterfall for IDS: Hardware-enforced security between OT networks and IDS sensors Waterfall for IDS provides hardware-enforced security that deploys transparently between OT …

IoT is an ecosystem, as secure as its weakest link
Remember when, three years ago, several Mirai botnets hit DNS provider Dyn and caused part of the Internet to be unreachable for most users in North America and Europe? For a …

How can security teams effectively monitor OT and ICS networks?
Modern industrial operations are complex and dynamic environments that have unique security challenges. Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, …

New infosec products of the week: November 1, 2019
Jetico releases BestCrypt Volume Encryption Enterprise Edition for Mac Jetico launched BestCrypt Volume Encryption – Enterprise Edition for Mac. Expanding on many years of …

Exploring the benefits of cybersecurity certification
In this interview, Tony Vizza, Director of Cybersecurity Advocacy APAC, (ISC)2, talks about the benefits of earning a cybersecurity certification, the most common …

New infosec products of the week: October 25, 2019
Delta Risk ActiveEye 2.0 eliminates more than 95% of false positives With a focus on advanced security automation, the ActiveEye 2.0 platform eliminates more than 95 percent …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence