Please turn on your JavaScript for this page to function normally.
Secure file sharing uncovered

Ahmet Tuncay is the CEO of Soonr, a provider of secure file sharing and collaboration services. In this interview he talks about making security a priority, discusses what …

Small businesses and the cloud: How to mitigate the risks

Security concerns are still preventing many small businesses from using new technology methods to accelerate growth. The cloud is one major example of a “hot …

Change auditing and Netwrix Auditor

Michael Fimin is the CEO of Netwrix. In this interview he talks about the importance of change auditing and outlines the features of Netwrix Auditor. Why should organizations …

DDoS attacks: Criminals get stealthier

There is a lot of media hype surrounding volumetric style DDoS attacks recently where the focus has been on large Gb/sec attacks, sometimes up to 400 Gb/sec. In reality, these …

Using ITOA to secure endpoints

Businesses today invest heavily in security technology in an effort to protect the most vulnerable aspects of their IT infrastructure – the endpoints and end-user …

Essential steps for implementing Data Loss Prevention

In this podcast, recorded at Infosecurity Europe 2014, Raul Condea from CoSoSys talks about essential steps to take when implementing Data Loss Prevention (DLP). When looking …

The importance of continuous monitoring

In this podcast, recorded at Infosecurity Europe 2014, Corey Bodzin, VP of Product Management at Qualys, discusses the need for continuous monitoring of the growing perimeter …

The story of Pwnie Express

Pwnie Express provides security testing solutions for today’s distributed enterprise and their hard-to-reach branch offices. We have met them at numerous conferences and …

What keeps senior IT security pros up at night? It’s not what you think

In the security space, last year was one for the books. Edward Snowden made waves after leaking classified documents detailing government surveillance programs, which raised …

Top 4 strategies to mitigate cyber intrusions

In this podcast, recorded at Infosecurity Europe 2014, Wolfgang Kandek, CTO at Qualys, talks about the Top 4 Critical Security Controls to fend off attacks. The Council on …

Warbiking tour reveals dismal state of wireless security

In this podcast, recorded at Infosecurity Europe 2014, James Lyne, Global Head of Security Research at Sophos, talks about how he took his computer-equipped bicycle onto the …

Calling the cloud: Challenges of managing information

The cloud continues to be much discussed and the many benefits it offers organizations of all sizes. Rarely is it mentioned, though, that there are a number of complications …

Don't miss

Cybersecurity news