Mirko Zorz
Thecus N5550 NAS Server inside and out
Having a backup drive has become essential. Those serious about their storage needs turn to NAS devices. Like most tech available today, those range from introductory models …
Passwords: Real-world issues, tips and alternatives
Per Thorsheim is an independent information security adviser based in Norway. He is the founder and main organizer of PasswordsCon, the first and only international conference …
Europe’s most significant information security event
Joy-Fleur Brettschneider is the Group Marketing Manager at Reed Exhibitions – Infosecurity Group. In this interview she talks about the most significant European IT …
Downtime explanation
You’ve probably noticed we were offline yesterday for nearly 13 hours. The problem was with our hosting provider, Sago Networks, who reportedly experienced an issue with …
Blocking DDoS attacks with a cloud-based solution
In this interview, Jag Bains, CTO of DOSarrest, talks about various types of DDoS attacks and why a cloud-based solution is a good fit for most organizations. Despite being an …
Identifying security innovation strategies
Tom Quillin is the Director of Cyber Security Technology and Initiatives at Intel Corporation. In this interview he talks about security innovation, current and future …
Securing mobile applications
In this interview, Dan Cornell, Principal of Denim Group, talks about the most common pitfalls of securing mobile applications, discusses the challenges involved in performing …
Compliance misconceptions, challenges and tips
In this interview, Paul Koziarz, President and General Manager of Regulatory Compliance at CSI, talks about the misconceptions related to compliance, provides advice for CSOs …
A security advisor’s perspective on the threat landscape
In this interview, Sean Sullivan, the Security Advisor at F-Secure Labs, talks about threats he’s seen during his career, iOS vs. Android security, security awareness …
CISO challenges and security ROI
Mark Brown is the Director of Information Security at EY. In this interview he offers guidance for CISOs, discusses the technical competence of company leaders, tackles …
Working with the Toshiba FlashAir II wireless SD card
With storage prices declining and the popularity of SD cards increasing, some computer makers are incorporating SD card readers into their machines. I find myself using them …
Mobile data leakage
Attack vectors in the mobile world are related to apps, content and web. In this podcast recorded at RSA Conference 2014, Mike Raggo, Security Evangelist at MobileIron, …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise