Mirko Zorz
The role of identity in responding to the threat environment
Organizations are struggling to respond to an evolving threat environment – APTs, insider attacks, accidental breaches. Information is being stolen at an industrial …
Facebook security and privacy pitfalls
In this interview, Andrei Serbanoiu, Online Threats Researcher at Bitdefender, discusses Facebook security and privacy pitfalls, the dangers of sharing on the social network, …
How to protect against unauthorized spying
In this podcast recorded at RSA Conference 2014, Wayne Thayer, the General Manager of Security Products at GoDaddy and a member of the CA Security Council, discusses how …
Two-factor authentication with Duo Security
In this podcast recorded at RSA Conference 2014, Zach Lanier, Senior Security Researcher at Duo Security, talks about two-factor authentication with Duo Security. The Duo …
Marcus Ranum on security innovation and Big Data
Marcus Ranum, CSO at Tenable Network Security, is an expert on security system design and implementation. In this interview he talks about the evolution of Big Data and true …
Protecting data against unwanted surveillance
Network security has been in the spotlight more than ever the past few months, and for good reason. We’ve seen many scary headlines that have put the pressure on …
Understanding the top 20 Critical Security Controls
In this podcast recorded at RSA Conference 2014, Wolfgang Kandek, CTO at Qualys, talks about the 20 Critical Security Controls, which outline a practical approach to …
Is your browser a user agent, or a double agent?
In this podcast recorded at RSA Conference 2014, Mike Shema, Director of Engineering at Qualys, discusses how privacy shouldn’t be an afterthought in the browser. Data …
Big Data security and privacy challenges
In this interview, Leighton Johnson, CTO, Senior Security Engineer for Information Security and Forensics Management Team (ISFMT), talks about how Big Data is transforming the …
Egnyte CSO details company security roadmap
In this podcast recorded at RSA Conference 2014, Kris Lahiri, CSO at Egnyte, talks about his security roadmap, which details the company’s plans to raise the global …
Exploring identity relationship management
Trying to solve the identity management and security issues for the employees and customers of a large Fortune 1000 corporation is a massive undertaking. In this podcast …
The password is dead: Next generation access management strategies
If you follow the news, it’s hard to miss all the breaches and stolen passwords offered for sale. The reality is that the method of processing passwords hasn’t …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security