Mirko Zorz

New infosec products of the week: October 18, 2019
Pradeo Secure Private Store facilitates and expands safe BYOD usage Pradeo launched a unique Secure Private Store solution that allows organizations to distribute mobile …

New infosec products of the week: October 11, 2019
FireEye Digital Threat Monitoring: Visibility beyond your walls FireEye Digital Threat Monitoring automatically collects and analyzes content on the dark and open web, …

New infosec products of the week: October 4, 2019
Anomali Altitude automates detection, analysis, and threat response The Anomali Altitude platform delivers Anomali Lens, Anomali ThreatStream, and Anomali Match. The …

Security is slowly becoming essential to doing business
A veteran of the information security industry, Greg Jensen has spent the last six years at Oracle as the Senior Director of Oracle’s Cloud Security solutions. He’s also …

Targeted threat intelligence and what your organization might be missing
In this Help Net Security podcast recorded at Black Hat USA 2019, Adam Darrah (Director of Intelligence), Mike Kirschner (Chief Operating Officer) and Christian Lees (Chief …

New infosec products of the week: September 13, 2019
Awake Security enhances its platform with the ability to identify attackers based on their intent Awake Security introduced Adversarial Modeling, an industry-first capability …

IIoT security challenges: Dealing with cutting edge technologies
Dr. Jesus Molina is the Director of Business Development at Waterfall Security Solutions, and in this interview with Help Net Security he talks about the security issues …

New infosec products of the week: September 6, 2019
Trustwave launches Trustwave Fusion, a new cloud-based cybersecurity platform The Trustwave Fusion platform connects the digital footprints of enterprises and government …

New infosec products of the week: August 23, 2019
YubiKey 5Ci: First security key designed with both USB-C and Lightning connectors This unique dual-connector functionality makes the YubiKey 5Ci the perfect solution for …

Protecting iOS and Android applications in a fully automated way
In this Help Net Security podcast recorded at Black Hat USA 2019, Dave Belt, Technology Evangelist at Irdeto, and Jaco du Plooy, VP Cloakware at Irdeto, discuss the current …

New infosec products of the week: August 16, 2019
BitSight Enterprise Analytics enables more effective risk management BitSight Enterprise Analytics helps security and risk leaders gain insight into the impact of risk …

Embracing the cloud and meeting its security demands
If you want to build a career in information security, there’s no shortage of diverse roles you can aim for. Whether you’ll end up doing that or something else …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence