Mirko Zorz
Identity verification: Staying ahead of post-breach era consumer preferences
In the wake of numerous high-profile data breaches and privacy incidents, consumers are increasingly concerned about the security of their identities and what companies are …
Digital transformation: Visibility compliance in a transitional world
In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses digital transformation challenges, and illustrates what an organization has to do …
New infosec products of the week: June 22, 2018
ExtraHop Reveal(x) sheds light on the darkspace ExtraHop announced Reveal(x) Summer 2018. The latest release includes new capabilities designed to modernize enterprise …
Inferring Internet security posture by country through port scanning
In this podcast, Tod Beardsley, Director of Research at Rapid7, talks about the recently released National Exposure Index, which aims to better understand the nature of …
(IN)SECURE Magazine issue 58 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 58 has been released today. Table of contents Is …
New infosec products of the week: June 15, 2018
Container security from dev to production Sysdig released Sysdig Secure 2.0, that enables enterprises to secure containers and microservices. The latest version adds …
The challenges of securing mobile workers and keeping data secure
Recently, Apricorn announced new research highlighting that 95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and nearly one in …
Zero Trust Security: Never trust, always verify
Zero Trust Security assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. In this …
How third-party risk affects your GDPR compliance
In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses third-party risk and how it affects the GDPR compliance of your organization. …
Cybersecurity: A core component of digital transformation
In this podcast, Kai Grunwitz, Senior VP EMEA at NTT Security, talks about the NTT Security 2018 Risk:Value Report, and the importance of cybersecurity for a successful …
New infosec products of the week: June 1, 2018
JASK transforms how SOC operators visualize cyber attacks JASK is capturing industry demand with new features centered around enterprise-wide alert linkages and analyst …
Make certificate visibility and security a part of your overall security program
In this podcast recorded at RSA Conference 2018, Asif Karel, Director of Product Management at Qualys, illustrates why certificate visibility and security should not just be …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA