Mirko Zorz
The importance of data loss prevention for OS X
Apple products have increasingly gained popularity in enterprise environments due to perception that they are so secure they will never get attacked and no data will be …
The risks of moving data into cloud and mobile environments
In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends …
Securing the smart grid: European Network of Cyber Security
Dr. Klaus Kursawe is the Chief Scientist at the European Network of Cyber Security (ENCS), where he is leading the research and development activities for critical …
Social threat intelligence
There’s been an explosion of companies that realized threat intelligence was the next frontier. In this podcast recorded at RSA Conference 2015, Trevor Welsh, Sales …
Product spotlight: Qualys Web Application Firewall 2.0
In this podcast recorded at RSA Conference 2015, Wolfgang Kandek, CTO at Qualys, talks about the recently announced Qualys Web Application Firewall (WAF) version 2.0, that …
The importance of integrating identity and data
In this podcast recorded at RSA Conference 2015, Siva Belasamy, CEO and CTO at Deep Identity, talks about how identifying who has access to what, and the risks associated with …
Emerging trends and targeted threat intelligence
In this podcast recorded at RSA Conference 2015, Court Little, Director of Product Management at Solutionary, talks about how the bar is being raised across the entire …
Protecting and identifying your information assets
In this podcast recorded at RSA Conference 2015, Tim Upton, CEO at TITUS, illustrates how TITUS gives your data an identity by adding metadata to an information asset such as …
The value of patching and how to do it properly
Patching has been the stalwart of the information security community for at least the last 15 years. In this podcast recorded at RSA Conference 2015, Wolfgang Kandek, CTO at …
Planning for the Internet of Things
As organizations plan for the future, and how security has to operate within their business, they now have to worry about the Internet of Things (IoT). There’s a clear …
Crowdsourcing your bug bounty program
In this interview, David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way. …
Banks and IT security: The elements of success
In this interview, Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege