Mirko Zorz
Securing the U.S. electrical grid
The Center for the Study of the Presidency & Congress (CSPC) launched a project to bring together representatives from the Executive Branch, Congress, and the private …
Inside the ISO 27001 Documentation Toolkit
You work for a small or medium company and you'd like to become compliant, but budget is always an issue. The ISO 27001 Documentation Toolkit from 27001 Academy is here to …
How the role of the CSO is changing
Since Steve Katz became the first CISO back in 1996, both business leaders and the security industry in general have been thinking and rethinking the need for such a person …
BGP hijacking for cryptocurrency profit
In cryptocurrency, “mining” is the act of validating transactions listed in the public ledger (also known as the block chain). When a transaction is initiated, it …
Breaking the security of physical devices
In this podcast recorded at Black Hat USA 2014, Silvio Cesare, Director of Anti-Malware Engineering at Qualys, discusses the security measures of a number of household devices …
Continuous monitoring for your perimeter
Qualys Continuous Monitoring is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they …
The dangers of backdoor passwords
In an increasingly connected world, backdoor passwords have large implications on the Internet of Things, the medical world and industrial control systems. While you might …
A walk through Black Hat USA 2014
Here’s a walk through video of the Business Hall at Black Hat USA 2014. The video features: Qualys Firemon iBoss Crowdstrike Palo Alto Networks Shape Security Pwnie …
The art and science of detecting emerging threats
In this interview, Stephen Huxter, COO at Darktrace, talks about the challenges involved in detecting emerging threats, Recursive Bayesian Estimation, the evolution of AI, and …
iOS security myths and threats
In this interview, Zuk Avraham, CEO of Zimperium, talks about iOS security myths and threats, discusses the difficulties in exploring iOS security vs. “breaking” …
How secure are today’s critical networks?
In this interview, Dr. Lutz J?¤nicke, CTO at Innominate Security Technologies, illustrates the security of critical networks, the regulatory mandates for organizations in the …
The role of the cloud in the modern security architecture
In this interview, Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA