Mirko Zorz
Secure by design
In this video recorded at the IBM Innovate 2010 conference, David Grant, the Director of Security Solutions at IBM Rational, talks about how software is the invisible thread …
Q&A: Sandbox for Adobe Reader
Didier Stevens is an IT security consultant well-known for his research into malicious PDF files. Since Adobe announced a sandbox for Adobe Reader, it was a perfect …
Q&A: BruCON security conference
Sebastien Deleersnyder is an OWASP Foundation board member and one of the organizers of the BruCON security conference in Belgium. In this interview, he discusses this …
Q&A: Infosecurity Russia. Storage Expo. Documation 2010
Alexandr Vlasov is a recognized expert in information security and personal data, working as a Business Development Executive at Groteck Business Media. In this interview he …
Q&A: Phishing explained
Dr. Jason Hong is the CTO and co-founder of Wombat Security Technologies, a provider of cyber-security training and filtering solutions. In this interview he discusses …
Q&A: Symantec’s acquisitions and the future
Francis deSouza is senior vice president of the Enterprise Security Group at Symantec. In this interview he discusses Symantec’s recent acquisitions, how they mitigate …
Security+ SY0-201 Video Mentor
When I glance at my bookshelf, I see many certification titles racking up an imposing number of pages, and I keep wondering why there's so little interactive material …
Q&A: OWASP AppSec Research
John Wilander is the chapter leader for OWASP Sweden and expert consultant at Omegapoint AB. He’s working professionally in the intersection between software development …
Splunk.com password leak
Splunk announced on their blog that they discovered the logging of users’ passwords in clear text. The culprit is debug code that found its way onto the www.splunk.com …
iPhone OS 4.0 security fear, uncertainty and doubt
It is inevitable. With every mainstream technology news, comes at least one security company that wants to piggyback on it and introduce themselves to the world by making …
Web application security issues and solutions
In this video, recorded at RSA Conference 2010, Mandeep Khera from Cenzic talks about web application security issues and solutions. He focuses on the fact that most web …
Cloud computing security: An insider’s view
As CSO of Qualys, Randy Barr is responsible for security, risk management and business continuity planning of the QualysGuard platform. In this video Randy talks about cloud …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise