Mirko Zorz
Q&A: Remote access and Entrust IdentityGuard
Mike Moir is a Product Manager for the Entrust IdentityGuard solution – a versatile authentication platform that meets diverse needs for strong second factor …
Free website malware detection service
Thousands of web sites are infected with malware daily, propagating the infection to visitors of their web sites at an increasing speed. To combat these threats, QualysGuard …
Q&A: Web application security testing
As the CTO and VP of Engineering at Cenzic, Lars Ewe has a broad background in (web) application development and security. In this interview he discusses issues related to web …
Q&A: Cisco Secure Borderless Networks
Shalabh Mohan is the Director, Product Management, Cisco STBU. He manages the firewall, VPN, and Web security businesses with a focus on secure mobility. In this interview he …
Lessons learned from RSA Conferences
In this video, Philippe Courtot, the Chairman and CEO of Qualys, offers insight into the past and present of the RSA Conference. He talks about how it has been growing and how …
Q&A: Google hacking
Robert Abela is a Technical Manager at Acunetix and in this interview he discusses the importance of Google for security research, provides tips on Google for information …
Q&A: Malware analysis
Greg Hoglund is the CEO and Founder of HBGary. He has been a pioneer in the area of software security. After writing one of the first network vulnerability scanners, he …
Q&A: InfoSec World Conference
Dina Dvinov is the Conference Marketing Manager at the MIS Training Institute and in this interview discusses the InfoSec World Conference. Introduce InfoSec World Conference …
Backup WordPress automatically with Backupify
You backup your computer, but do you backup your online activities? The typical Internet user nowadays uses a variety of services such as Flickr or Twitter, runs a WordPress …
Q&A: SOURCE Conference
Stacy Thayer is the Founder and Executive Director of SOURCE Conferences. Prior to founding SOURCE Conferences, Stacy was employed for a Fortune 500 company, where she worked …
Cybercriminals focus on targeted attacks
When it comes to computer security, bad news usually follows even the rare positive statistic. In their latest report, Websense note that they’ve seen the number of …
Q&A: Hackers and experimental artists
The “Noise vs. Subversive Computing” project is a collaborative release between noise and experimental artists working with subversive technologists and computer …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise