Mirko Zorz
![RES](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104959/RES-product-400x200.jpg)
New infosec products of the week: February 24, 2017
Security solutions for IoT automotive telematics Building a secure automotive telematics platform to achieve a profitable business model for automakers and ecosystem partners …
![woman](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105018/woman-400x200.jpg)
Women in infosec: Real-life experiences and challenges
In all segments of society and business, minorities encounter problems that the majority rarely or never faces. And information security is – I think we can all agree …
![Passages](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105009/Passages-400x200.jpg)
Passages: Secure virtual browser for malware isolation
Over 90% of undetected attacks come through the web. In this podcast recorded at RSA Conference 2017, Lance Cottrell, Chief Scientist at Ntrepid, talks about Passages, a …
![iovation authentication](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105026/iovation-authentication-400x200.jpg)
How a dynamic range of authentication can open doors for trusted customers
In this podcast recorded at RSA Conference 2017, Michael Thelander, Director of Product Marketing at iovation, talks about lessons learned from bringing authentication …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111440/business-400x200.jpg)
NTT Security: Delivering cyber resilience
In this podcast recorded at RSA Conference 2017, Garry Sidaway, SVP of Security Strategy & Alliances for NTT Security, talks about the formation of NTT Security and how …
![samas-ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113333/samas-ransomware-400x200.jpg)
How to leverage intelligent deception to detect cyber attacks
Perimeters are fading, and attackers find it easier and easier to penetrate organizational networks. Organizational networks today are chaotic, they’re very dynamic, and this …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114027/lights-400x200.jpg)
New infosec products of the week: February 10, 2017
Capsule8: Container-aware, real-time threat protection for Linux Capsule8 emerged from stealth mode to unveil its plans for the industry’s first container-aware, …
![point](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194338/point-400x200.jpg)
New infosec products of the week: February 3, 2017
New approach to continuous Docker container security NeuVector’s solution for container security is itself a container. The application automatically learns and whitelists …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105450/fire-400x200.jpg)
Increasingly sophisticated attacks call for advanced protection tools
A new NTT Security report underscores the need for more advanced tools to protect organizations’ data and networks from the evolving tactics, techniques and procedures (TTPs) …
![building blocks](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111907/building_blocks-400x200.jpg)
New infosec products of the week: January 27, 2017
Prevent DNS-based data exfiltration and detect malware Delivered as a service, Infoblox ActiveTrust Cloud addresses the needs of global enterprises with a mobile workforce and …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105314/people-400x200.jpg)
Infosec certification and the talent shortage crisis
As more enterprises aspire to create future workspaces and harness the benefits of a mobile workforce that leverages cloud platforms, there’s a greater need to implement …
![explode](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113434/explode-400x200.jpg)
New infosec products of the week: January 20, 2017
Twistlock 1.7 comes with new runtime defense architecture Twistlock unveiled a new runtime defense architecture for its Twistlock 1.7 container security platform that enables …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege