Mirko Zorz
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111038/cloud-400x200.jpg)
Should cloud vendors cooperate with the government?
More than one in three IT pros believe cloud providers should turn over encrypted data to the government when asked, according to Bitglass and the Cloud Security Alliance …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112300/phishing-400x200.jpg)
Multi-layered phishing mitigation
In this podcast recorded at Black Hat USA 2016, Eyal Benishti, CEO at IRONSCALES, talks about their multi-layered phishing mitigation solution, which brings together human …
![FlockFlock](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111050/flockflock-400x200.jpg)
FlockFlock: File access enforcement for macOS
The more serious you are about information security, the more you realize it’s difficult to be sure a system isn’t compromised. While malware authors don’t target the Mac …
![ISO 27001](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111106/iso27001-400x200.jpg)
Using ISO 27001 to improve your information security posture
ISO 27001 delivers direct benefits that improve an organisation’s information security posture, despite the ongoing struggle to convince boards of the importance of …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111115/qualys-world-400x200.jpg)
Bringing security into IT and application infrastructures
In this podcast recorded at Black Hat USA 2016, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about a new trend in bringing security into IT …
![Ryan Stolte, Bay Dynamics](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111229/ryan_stolte_office-400x200.jpg)
Security analytics: Risk from the inside out
High profile security breaches are at an all-time high. The threat has finally reached the boardroom, and we’re seeing increased security spending. Funds are increasingly …
![AndroidTamer](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111232/androidtamer-400x200.jpg)
Android Tamer: Virtual platform for Android security professionals
Android Tamer is a free and open source Swiss army knife type of tool for Android security. The recently released version 4 moves towards Debian package compatibility. Users …
![Black Hat Arsenal](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111234/arsenal-400x200.jpg)
Going to Black Hat? You don’t want to miss the Arsenal!
Every August, more than 10,000 information security professionals from all over the world converge in Las Vegas to attend Black Hat USA. The event features innovative …
![ThreadFix](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111239/threadfix-400x200.jpg)
ThreadFix: Software vulnerability aggregation and management system
ThreadFix is a software vulnerability aggregation and management system that helps organizations aggregate vulnerability data, generate virtual patches, and interact with …
![Nishang](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111252/nishang-400x200.jpg)
Nishang: Using PowerShell for penetration testing
Nishang is a framework, and a collection of scripts and payloads which enables PowerShell usage for offensive security, penetration testing and red teaming. The tool is the …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111400/chess-400x200.jpg)
What a Chief Strategy Officer does, and why you need one
Seasoned IT security expert and former Gartner analyst Richard Stiennon recently became the Chief Strategy Officer for the Blancco Technology Group. It was the perfect …
![Eduardo Cabrera, Chief Cybersecurity Officer at Trend Micro](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111427/ed_cabrera-featured4-400x200.jpg)
CISOs need teamwork and a framework, says Chief Cybersecurity Officer at Trend Micro
Eduardo Cabrera is the Chief Cybersecurity Officer at Trend Micro, responsible for analyzing emerging cyber threats to develop enterprise risk management strategies. Before …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege