Mirko Zorz
IT security jobs: What’s in demand and how to meet it
The information security job market continues to expand. In fact, according to a report by Burning Glass Technologies, over the past five years demand for cybersecurity …
Hacking charge stations for electric cars
The vision of electric cars call for charge stations to perform smart charging as part of a global smart grid. As a result, a charge station is a sophisticated computer that …
The CSO perspective on risk management
Candy Alexander is the CSO at Long Term Care Partners and volunteers as a member of the International Board of Directors for ISSA. In the past, she was invited to the White …
The importance of secure coding
Jim Manico is the VP of Security Architecture for WhiteHat Security. In this video recorded at Hack In The Box 2013 Amsterdam, Manico illustrates the importance of secure …
Why wiping decommissioned IT assets should be a must
Last week I’ve written about the ways confidential data can leak outside the organization if the IT security team doesn’t pay attention to printers, shredders, or …
How secure is your confidential data?
It seems ages ago that companies were first warned about the danger of confidential information being found in trash bags in front of the office, yet despite the use of …
A closer look at Hack In The Box 2013 Amsterdam
Here’s a look at Hack In The Box 2013 Amsterdam, that took place at the Okura Hotel on April 10-11. This year’s event is going to be remembered by the widely …
Twitter wisdom: April 9, 2013
Here’s food for thought from people you should be following on Twitter. Actually it strikes me dentistry and infosec are similar. We both breach prevention better than …
SCADA security
Amol Sarwate is the Director of Vulnerability Labs at Qualys. In this video, recorded at RSA Conference 2013, Sarwate introduces SCADA security.
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
As I've always worked at small companies, I've been fascinated by the politics and problems experienced by those working for larger organizations. Surviving and thriving in …
Infosec Twitter wisdom: March 27, 2013
Here’s food for thought from people you should be following on Twitter. People don’t get why Inception was such a profoundly great movie. It’s a story where …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security