Mirko Zorz
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
With the proliferation of VoIP networks and a substantial amount of FUD (Fear, Uncertainty and Doubt) that surrounds the process of implementing security on these networks, …
Interview with Christen Krogh, Opera Software’s VP of Engineering
Christen Krogh is responsible for all software development at Opera. Krogh received his bachelor’s degree in computer science from Glasgow University and his Ph.D from …
Richard Rushing, AirDefense CSO, on Wireless Security
At the recent RSA Conference 2007 in San Francisco, AirDefense was doing wireless airwave monitoring. AirDefense found more than half of the 347 wireless devices susceptible …
Interview with Kurt Sauer, CSO of Skype
As Chief Security Officer at Skype Technologies, Kurt Sauer is focused on delivering trusted communications services via Skype’s platforms. Both the software delivered …
Jay Bavisi, President of EC-Council, on Ethical Hacking
We met with Jay Bavisi, President of EC-Council, at the RSA Conference 2007 in San Francisco. In this 07:20 video he talks about ethical hackers, the importance of …
Microsoft Chief Security Advisor Discusses Security Challenges and Windows Vista
Last week in London at the Infosecurity press conference, Ed Gibson, the Chief Security Advisor at Microsoft, shared his views on the security challenges the Redmond giant is …
Interview with Mads Lillelund, CEO of Bluesocket
Mads Lillelund is the CEO of Bluesocket, the leader in open wireless security and management solutions that simplify the complexities of mobile enterprises. In this interview …
Computer Security in 2007: A Report From The Infosecurity Europe Press Conference
With an announced 300 exhibitors (90 out of the UK), Infosecurity 2007 is definitely the largest gathering of principal vendors in Europe. Launched as a UK event in 1996, this …
Interview with Balazs Fejes, CTO of EPAM Systems
Balazs Fejes joined EPAM Systems in 2004, when Fathom Technology merged with EPAM Systems. Prior to co-founding Fathom Technology Mr. Fejes was a chief software architect/line …
Q&A with Amichai Shulman on the Critical Vulnerability in AJAX Technology
Recently, the Imperva Application Defense Center announced the discovery of a critical vulnerability in DWR (Direct Web Reporting), a key underlying technology in the AJAX web …
Interview with Marc Vaillant, CEO of Criston
Since the start of his career, Marc Vaillant has always worked in the high-tech sector, holding positions in companies of various sizes. Before joining Criston, he was Chief …
Interview with Vladimir Katalov, CEO of ElcomSoft
Vladimir Katalov is working in ElcomSoft from the very beginning. He created the first program the password recovery software line has started from: Advanced ZIP Password …
Featured news
Resources
Don't miss
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites
- Black Friday 2025 for InfoSec: How to spot real value and avoid the noise