Mirko Zorz

New infosec products of the week: May 31, 2019
SailPoint Predictive Identity platform: The future of identity governance SailPoint unveiled the SailPoint Predictive Identity platform, the intelligent cloud identity …

A veteran’s look at the cybersecurity industry and the problems that need solving
For many in the infosec industry, Daniel Miessler needs no introduction, as he’s a 20-year industry veteran, a professional that fulfilled a variety of security roles at …

New infosec products of the week: May 24, 2019
Infocyte HUNT Cloud for AWS: Detection and IR for high-growth cloud environments Infocyte announced the availability of Infocyte HUNT Cloud for AWS, a solution combining …

New infosec products of the week: May 17, 2019
Alcide launches continuous security and hygiene scanner for Kubernetes and Istio Alcide Advisor is a continuous security and hygiene scanner for Kubernetes & Istio, which …

How can we give cybersecurity analysts a helping hand?
It’s tough being a cybersecurity analyst these days. Over the last few years we have been repeatedly reminded of the challenge they are now facing, primarily through the …

New infosec products of the week: May 10, 2019
D3 operationalizes the MITRE ATT&CK framework, advancing its SOAR platform Ushering in a shift from event-based to intent-based response, D3’s SOAR 2.0 treats events as …

New infosec products of the week: May 3, 2019
Trustwave unveils new database security scanning and testing software Trustwave unveiled Trustwave DbProtect, new database security scanning and testing software that helps …

What you can expect at HITBSecConf2019 Amsterdam
Taking place across 5 days from the 6th till the 10th of May 2019, HITBSecConf2019 Amsterdam is one of the most prestigious cybersecurity events in Europe. With the event …

New infosec products of the week: April 19, 2019
CHAOSSEARCH releases new search and analytics platform for cloud storage CHAOSSEARCH released their search and analytics platform. Using scalable elasticity and disruptive …

Microsoft 365 security: Protecting users from an ever-evolving threat landscape
In this age of frequent security and data breaches, the statement “We take our customers’ privacy and security very seriously” has been heard from breached …

What you can expect at Cyber Week 2019
Cyber Week is a large international cybersecurity event, hosted each year at Tel Aviv University in Israel. Over the past eight years, Cyber Week has become internationally …

Employee cybersecurity essentials part 2: Lost devices and unsafe connections
Security is only as strong as its weakest link, and as we have seen, that includes your employees. Faulting workers for behavior they’ve become accustomed to in their private …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence