Mirko Zorz

How enterprise IT security conversations have changed
Deutsche Telecom is one of the world’s largest telecom companies, and its corporate IT and cyber security arm T-Systems is one of the largest European IT services …

New infosec products of the week: July 21, 2017
Awake Security unveils advanced security analytics solution Awake’s advanced security analytics provide security teams the insights needed to understand the scope and impact …

New infosec products of the week: July 14, 2017
Pramati introduces ThumbSignIn biometric authentication platform Pramati Technologies announced the ThumbSignIn biometric authentication SaaS platform for mobile and web …

How a museum protects some of the world’s finest pieces of art
After an internal audit revealed the limitations of Thyssen-Bornemisza Museum’s existing (analog) camera surveillance system, as well as a server that has been installed …

Rising information security threats, and what to do about them
The digital threat landscape faced by enterprises large and small is in perpetual flux, and keeping an eye on things and adapting defenses should be of primary importance to …

Eternal Blues: A free EternalBlue vulnerability scanner
It is to be hoped that after the WannaCry and NotPetya outbreaks, companies will finally make sure to install – on all their systems – the Windows update that …

New infosec products of the week: June 30, 2017
Protection against the impacts of malware, ransomware and DNS data exfiltration Akamai introduced Enterprise Threat Protector, a solution designed specifically to address the …

Crowdsourced security testing and bug bounties
In the past few years, the bug bounty economy has been growing steadily, with more organizations getting on board every day. In this podcast, Ilia Kolochenko, CEO at High-Tech …

New infosec products of the week: June 23, 2017
API Behavioral Security: Detecting and blocking attacks targeting API infrastructures Elastic Beam unveiled its flagship solution, API Behavioral Security (ABS), the first …

InfoArmor: Operatively-sourced threat intelligence
In this podcast, Mike Kirschner, Senior Vice President of Advanced Threat Intelligence at InfoArmor, talks about this dark web operatively sourced intelligence firm that is …

Privacy, security concerns grow for wearables
While Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact …

Regional regulatory compliance trends: Strategies and implications
In this podcast, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about regulatory compliance trends that across a variety of different regions in …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance