Please turn on your JavaScript for this page to function normally.
How security analytics help identify and manage breaches

In this interview, Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today’s complex security architectures, talks about the most …

The evolution of backup and disaster recovery

In this interview, Amanda Strassle, IT Senior Director of Data Center Service Delivery at Seagate Technology, talks about enterprise backup issues, illustrates how the cloud …

Endpoint security myths and why they persist

In this interview, Roman Foeckl, CEO of CoSoSys, illustrates the most prominent endpoint security myths and explains why they persist. Furthermore, he talks about the hurdles …

Big Data security mistakes, tips and tricks

In this interview, Mark Cusack, Chief Architect at RainStor, talks about the main challenges of handling petabyte-scale volumes of data, illustrates the most obvious mistakes …

Cloud security threats, tips and best practices

In this interview, Gray Hall, CEO at Alert Logic, illustrates today’s top cloud security threats, tackles privacy and surveillance issues, and offers security best …

Exploring the mobile security landscape

In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping …

The building blocks of a successful authentication infrastructure

In this interview, Josh Alexander, CEO of Toopher, discusses how an increasingly mobile workforce shapes the way an organization deals with authentication issues, provides …

Wireless security risks and defenses

In this interview, Kent Lawson, CEO of Private WiFi, talks about the key threats exposed by wireless access, offers protection advice and illustrates the trends that will …

Gathering and using threat intelligence

In this interview, Tomer Teller, Security Innovation Manager at Check Point, talks about the role of threat intelligence in the modern security architecture, discusses how it …

Why security awareness matters

In this interview, Paulo Pagliusi, CEO at MPSafe Cybersecurity Awareness, talks about the value of security awareness and how it influences the overall security posture of an …

What’s next: Advanced Evasion Techniques

Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. …

Skills development for information security professionals

In this interview, John Colley, MD for (ISC)2 EMEA, talks about the challenges of his job, discusses critical information security areas, and tackles the future of …

Don't miss

Cybersecurity news