Mirko Zorz
The importance of continuous monitoring
In this podcast, recorded at Infosecurity Europe 2014, Corey Bodzin, VP of Product Management at Qualys, discusses the need for continuous monitoring of the growing perimeter …
Making the web a safe place to visit
The new truth is that the web browser is, increasingly, the primary threat vector for cyber attacks on the enterprise. Confidential research available to Gartner members …
Top 4 strategies to mitigate cyber intrusions
In this podcast, recorded at Infosecurity Europe 2014, Wolfgang Kandek, CTO at Qualys, talks about the Top 4 Critical Security Controls to fend off attacks. The Council on …
Warbiking tour reveals dismal state of wireless security
In this podcast, recorded at Infosecurity Europe 2014, James Lyne, Global Head of Security Research at Sophos, talks about how he took his computer-equipped bicycle onto the …
The Heartbleed effect
In this podcast, recorded at Infosecurity Europe 2014, Ivan Ristic, Director of Engineering at Qualys, talks about the Heartbleed bug and its impact on the security industry. …
Wearable technology privacy and security issues
In this interview, Dominic Storey, EMEA Technical Director at Cisco, talks about the security attacks wearable devices are susceptible to at the moment, how security should be …
Thecus N5550 NAS Server inside and out
Having a backup drive has become essential. Those serious about their storage needs turn to NAS devices. Like most tech available today, those range from introductory models …
Passwords: Real-world issues, tips and alternatives
Per Thorsheim is an independent information security adviser based in Norway. He is the founder and main organizer of PasswordsCon, the first and only international conference …
Europe’s most significant information security event
Joy-Fleur Brettschneider is the Group Marketing Manager at Reed Exhibitions – Infosecurity Group. In this interview she talks about the most significant European IT …
Downtime explanation
You’ve probably noticed we were offline yesterday for nearly 13 hours. The problem was with our hosting provider, Sago Networks, who reportedly experienced an issue with …
Blocking DDoS attacks with a cloud-based solution
In this interview, Jag Bains, CTO of DOSarrest, talks about various types of DDoS attacks and why a cloud-based solution is a good fit for most organizations. Despite being an …
Identifying security innovation strategies
Tom Quillin is the Director of Cyber Security Technology and Initiatives at Intel Corporation. In this interview he talks about security innovation, current and future …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users