Mirko Zorz
Network Intrusion Analysis
What happens after a network intrusion is detected? What steps do you need to take? What is the proper way to react in a specific situation? The authors say their intention …
Jon Callas on privacy in the modern age
In this interview, Jon Callas, co-founder of PGP and current CTO at Silent Circle, discusses the global erosion of privacy and the importance of confidentiality. He tackles …
Can you trust your online backup service?
While having lots of digital storage space at your physical location may be cheap nowadays, it’s also very useful to have offsite backups – not only in the event …
Chat securely on Facebook with Synapsid
Synapsid is an iOS app that promises an encrypted chat experience on Facebook. In addition to having secure conversations, Synapsid allows you to: view friends profiles, …
How big data is transforming information security
In this video recorded at Hack In The Box 2013 Amsterdam, Eddie Schwartz, CSO at RSA, The Security Division of EMC, discusses the impact of big data on information security. …
DDoS attacks: What they are and how to protect yourself
Ameen Pishdadi is the CTO at GigeNET. In this interview he discusses the various types of DDoS attacks, tells us who is at risk, tackles information gathering during attacks, …
BYOD: The why and the how
Brad Keller and Robin Slade are Senior Vice Presidents at The Santa Fe Group. In this interview they talk in detail about the challenges involved in evaluating, deploying and …
Instant Apple Configurator How-to
Apple Configurator is a tool used for the mass configuration of iOS devices. With many large organizations adapting a variety of iOS devices into their daily workflow, it's …
Information security executives need to be strategic thinkers
George Baker is the Director of Information Security at Exostar. In this interview he talks about the challenges in working in a dynamic threat landscape, offers tips for …
Reactions from the security community to the NSA spying scandal
Last week a whistleblower created quite the stir when he leaked documents about PRISM, a surveiilance program by the NSA. Below are comments on this scandal that Help Net …
Brown University CISO on education, BYOD and emerging threats
David Sherry is the CISO at Brown University. He leads the Information Security Group, charged with the development and maintenance of Brown’s information security …
A closer look at Mega cloud storage
Once a novelty, nowadays many cloud storage services are fighting for their piece of the market in the virtual world. Today I’m taking a look at Mega, a service that …