Mirko Zorz
Keeping your data secure while on the move
John Michael is the CEO at iStorage, a provider of secure portable data storage. In this interview he discusses the often overlooked repercussions of data loss, offers tips …
Inside the malware war zone
Adam Kujawa is the Head of Malware Intelligence for Malwarebytes. In this interview he talks about the evolution of malware in the past decade, illustrates the differences in …
Risk management issues, challenges and tips
Gary Alterson is the Senior Director, Risk and Advisory Services at Neohapsis. In this interview he discusses the most significant issues in risk management today, offers tips …
Online gaming threats and protection tips
In this podcast, recorded at Infosecurity Europe 2014, Christopher Boyd, Malware Intelligence Analyst at Malwarebytes, talks about online scams and phishing attacks, …
Secure file sharing uncovered
Ahmet Tuncay is the CEO of Soonr, a provider of secure file sharing and collaboration services. In this interview he talks about making security a priority, discusses what …
Change auditing and Netwrix Auditor
Michael Fimin is the CEO of Netwrix. In this interview he talks about the importance of change auditing and outlines the features of Netwrix Auditor. Why should organizations …
Stop all browser-borne malware from entering your network
In this podcast, recorded at Infosecurity Europe 2014, Branden Spikes, CEO, CTO & Founder of Spikes Security, talks about how malware has already done its job by the time …
Secure public WiFi with avast! SecureLine for iOS
While constant Internet connectivity can be useful, it does create many privacy and security issues whose existence remains a mystery for the majority of mobile users. If you …
Essential steps for implementing Data Loss Prevention
In this podcast, recorded at Infosecurity Europe 2014, Raul Condea from CoSoSys talks about essential steps to take when implementing Data Loss Prevention (DLP). When looking …
The importance of continuous monitoring
In this podcast, recorded at Infosecurity Europe 2014, Corey Bodzin, VP of Product Management at Qualys, discusses the need for continuous monitoring of the growing perimeter …
Making the web a safe place to visit
The new truth is that the web browser is, increasingly, the primary threat vector for cyber attacks on the enterprise. Confidential research available to Gartner members …
Top 4 strategies to mitigate cyber intrusions
In this podcast, recorded at Infosecurity Europe 2014, Wolfgang Kandek, CTO at Qualys, talks about the Top 4 Critical Security Controls to fend off attacks. The Council on …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests