Mirko Zorz
Three BYOD problems that need to be solved
The Bring Your Own Device (BYOD) phenomenon has long stopped being just a fad and the option has become a crucial part of keeping employees and contractors happy and …
Behind the scenes of the cleanest ISP in the world
The malware and botnet problem has been around for quite a while, and definitive solutions for it are still eluding the Internet and mobile communication industry, as well as …
SSL/TLS deployment best practices
SSL/TLS is a deceptively simple technology. It is easy to deploy, and it just works-¦ except that it does not, really. The first part is true – SSL is easy to deploy …
The sad reality of data security
Hacktivists, criminals, nation states, malicious or careless insiders – all these are fueling the need for data protection and risk management within enterprises. The …
User activity monitoring crucial to minimizing security risks
In this ever evolving threat landscape, willing or unwitting insiders often play a key role in security compromises of organizations. It used to be that an …
Europe’s largest infosec training event
In this interview, Gareth Dance, Conference Director, EMEA, SANS Institute, talks about SANS Secure Europe 2012. How would you introduce SANS Secure Europe 2012 to someone who …
Penetration testing tips, tricks and unusual situations
Raul Siles is a senior security analyst with more than 10 years of expertise performing advanced security services. He is a SANS Institute author and instructor of penetration …
Complex security architectures and innovation
Martin Borrett is the Director of the IBM Institute of Advanced Security in Europe. He leads the Institute and advises at the most senior level in clients on policy, business, …
The current challenges of being a CISO
In the last decade or so, the role of Chief Information Security Officer (CISO) was established in the great majority of business, government and non-profit organizations, and …
Android security from the ground up
Georgia Weidman is a penetration tester, security researcher, and trainer. She’s also one of the speakers at the upcoming HITBSecConf 2012 Amsterdam conference. In this …
Hardening the endpoint operating system
Qualys CTO Wolfgang Kandek, talks about the effects of hardening the endpoint operating system and improving the resilience against common attacks. As the CTO for Qualys, …
VolP: The new way in?
Voice is now data and as such it is a new attack vector for hackers into a company network. Most VoIP systems being deployed are based on Session Initiation Protocol (or SIP) …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise