Mirko Zorz

New infosec products of the week: April 21, 2017
ThreadFix integrates application security into DevOps pipelines Denim Group release of the latest version of ThreadFix, the company’s application vulnerability resolution …

Photos: HITBSecConf Amsterdam 2017
The always exciting Hack In The Box conference took place last week in Amsterdam. Groundbreaking security research was disclosed during the event, which also featured a free …

Mobile payment card cloning: Understanding the risks
Mobile contactless payments have grown exponentially and Host Card Emulation (HCE) – the possibility to emulate payment cards on a mobile device, without dependency on special …

New infosec products of the week: April 7, 2017
A rules engine that adapts to changing attack patterns DataVisor announced the latest addition to its full stack analytics platform, the DataVisor Automated Rules Engine, a …

Photos: SMAU Padova 2017 roadshow
Last week at Padovafiere we attended the SMAU Padova 2017 roadshow. The event featured several IT topics including cybersecurity and the Internet of Things – on the show …

New infosec products of the week: March 31, 2017
Waterfall Security, CNA Hardy and THB partner to create global industrial cyber proposition THB, CNA Hardy and leading cybersecurity specialist Waterfall Security Solutions …

New infosec products of the week: March 24, 2017
Lookout expands mobile endpoint security solution As a new Apple mobility partner, Lookout is introducing enterprise app review to enable enterprises building their own iOS …

Can you justify your security spend?
In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT …

Cybersecurity today: Turning positive with new thinking and innovation
In this podcast recorded at RSA Conference 2017, Melanie Ensign, Co-Chair for WISP and Head of Security & Privacy Communications at Uber, and Ajay Arora, CEO and founder …

How to harmonize IT GRC controls in your environment
In this podcast recorded at RSA Conference 2017, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about about achieving uniform compliance in risk …

New infosec products of the week: March 17, 2017
Capture, process, analyze data generated by IoT devices MapR Technologies announced MapR Edge, a small footprint edition of the MapR Converged Data Platform. Addressing the …

The information security marketplace shift
In this podcast recorded at RSA Conference 2017, Garry Sidaway, SVP of Security Strategy & Alliances for NTT Security, talks about the shift in the marketplace, and how …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance