Mirko Zorz
Do ethics get in the way of security professionals?
While it’s convenient to think that the information security industry is made up of highly ethical individuals who make the right decision every time, a stressful …
Data breaches lead to surge of spoofing attacks
The number of attacks on businesses is trending up as crimeware tools gain traction providing tools to fraudsters to automate cybercrime attacks leveraging the customer data …
Total data protection outside the firewall
Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014. In fact, by 2016, 25% of enterprises will secure access to …
Why WinSCP became an open source classic
If you’re a Windows user and you’re connecting securely to remote machines, you’ve probably heard about WinSCP. This multi-functional open source tool has …
Why saying YES is changing information security
In this podcast recorded at RSA Conference 2015, Tsion Gonen, Chief Strategy Officer at Gemalto, talks about how the information security is a very different place than 5-10 …
Product spotlight: Entrust IdentityGuard
All organizations require the means to authenticate the identities of users, machines or mobile devices for access to sensitive networks, services, applications or facilities. …
ThreatStream’s approach to threat intelligence
Imagine being able to make sense of all the threat information that’s flowing through your security controls and coming from your threat feeds in minutes, not weeks, months or …
Product spotlight: Targeted threat intelligence from Solutionary
As IT security threats have become more targeted to specific industries, organizations and even individuals, the need has arisen for threat intelligence that is tailored for …
Classification and protection of unstructured data
In this podcast recorded at RSA Conference 2015, Stephane Charbonneau, CTO of TITUS, talks about TITUS Classification Suite 4, a significant new release of its flagship data …
The importance of data loss prevention for OS X
Apple products have increasingly gained popularity in enterprise environments due to perception that they are so secure they will never get attacked and no data will be …
The risks of moving data into cloud and mobile environments
In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends …
Securing the smart grid: European Network of Cyber Security
Dr. Klaus Kursawe is the Chief Scientist at the European Network of Cyber Security (ENCS), where he is leading the research and development activities for critical …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance