Mirko Zorz
Phishing techniques, consequences and protection tips
In this interview, Rohyt Belani, CEO at PhishMe, illustrates the magnitude of the phishing threat. He discusses techniques, consequences and protection tips. What happens once …
Exploring data center design innovations
Douglas Alger is Cisco’s IT Architect for Physical Infrastructure. He develops architecture roadmaps, solutions and policies for the physical infrastructure of the …
Can you trust the cloud?
Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that cloud security issues (84.4%) and cloud privacy and compliance issues …
Microsoft’s worldwide threat assessment
In this podcast recorded at RSA Conference Europe 2012, Tim Rains, the Director of Product Management at Microsoft’s TWC group, talks about volume 13 of …
OS X Mountain Lion Pocket Guide
Since its release, OS X Mountain Lion has been hailed as the most advanced operating system coming out of Cupertino. With lots of new features and a myriad of small …
Security implications of the rise of silicon-based life forms
Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …
Inside SANS London 2012
Matt Anderson is the Director, EMEA at SANS Institute. In this interview he talks about SANS London 2012, Europe’s biggest and most important information security …
5 bad things IT administrators do
Philip Lieberman is the President at Lieberman Software Corporation and in this video talks about five awful things that IT administrators do and offers ways to fix these actions.
Information-related risks, threats and compliance
Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is a member of the Commission on Cyber Security for the 44th President and several executive …
What keeps information security leaders awake at night
In this interview, Herbert ‘Hugh’ Thompson, Program Committee Chair for RSA Conferences and Chief Security Strategist at People Security, talks about challenges …
Fast and furious reverse engineering
Tomislav Pericin is one of the founders of ReversingLabs and the company’s Chief Software Architect. In this video, recorded at Hack in The Box Amsterdam 2012, he talks …
Automated hacking
The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An …
Featured news
Resources
Don't miss
- What makes a security program mature and how to get there faster
- EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations
- Win-DDoS: Attackers can turn public domain controllers into DDoS agents
- How Brandolini’s law informs our everyday infosec reality
- From legacy to SaaS: Why complexity is the enemy of enterprise security