Mirko Zorz

Rewriting the rules on how to protect against evolving adversaries
Hackers are getting better at exploiting your organization’s increasingly complex IT environment. Adversaries are using highly customized attack campaigns to infiltrate …

Not all threat intelligence is created equal
In this podcast recorded at RSA Conference 2017, John Czupak, CEO at ThreatQuotient, and Jonathan Couch, Senior VP of Strategy at ThreatQuotient, talk about what’s important …

New infosec products of the week: February 24, 2017
Security solutions for IoT automotive telematics Building a secure automotive telematics platform to achieve a profitable business model for automakers and ecosystem partners …

Women in infosec: Real-life experiences and challenges
In all segments of society and business, minorities encounter problems that the majority rarely or never faces. And information security is – I think we can all agree …

Passages: Secure virtual browser for malware isolation
Over 90% of undetected attacks come through the web. In this podcast recorded at RSA Conference 2017, Lance Cottrell, Chief Scientist at Ntrepid, talks about Passages, a …

How a dynamic range of authentication can open doors for trusted customers
In this podcast recorded at RSA Conference 2017, Michael Thelander, Director of Product Marketing at iovation, talks about lessons learned from bringing authentication …

NTT Security: Delivering cyber resilience
In this podcast recorded at RSA Conference 2017, Garry Sidaway, SVP of Security Strategy & Alliances for NTT Security, talks about the formation of NTT Security and how …

How to leverage intelligent deception to detect cyber attacks
Perimeters are fading, and attackers find it easier and easier to penetrate organizational networks. Organizational networks today are chaotic, they’re very dynamic, and this …

New infosec products of the week: February 10, 2017
Capsule8: Container-aware, real-time threat protection for Linux Capsule8 emerged from stealth mode to unveil its plans for the industry’s first container-aware, …

New infosec products of the week: February 3, 2017
New approach to continuous Docker container security NeuVector’s solution for container security is itself a container. The application automatically learns and whitelists …

Increasingly sophisticated attacks call for advanced protection tools
A new NTT Security report underscores the need for more advanced tools to protect organizations’ data and networks from the evolving tactics, techniques and procedures (TTPs) …

New infosec products of the week: January 27, 2017
Prevent DNS-based data exfiltration and detect malware Delivered as a service, Infoblox ActiveTrust Cloud addresses the needs of global enterprises with a mobile workforce and …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act