Mirko Zorz

How do I select a backup solution for my business?
42% of companies experienced a data loss event that resulted in downtime last year. That high number is likely caused by the fact that while nearly 90% are backing up the IT …

Redefining business for a digital world with smart security decisions
Kurt John is Chief Cybersecurity Officer of Siemens USA, where he is responsible for the information security strategy, governance and implementation for the company’s largest …

How to increase cyber defense agility for the next lockdown
If this worldwide lockdown has taught us anything, it’s that we’re not nearly agile enough and we really need to prepare for future scenarios. Whether the next lockdown comes …

New infosec products of the week: May 1, 2020
Guardicore Infection Monkey now maps its actions to MITRE ATT&CK knowledge base The latest version of Guardicore Infection Monkey now maps its actions to the MITRE …

New infosec products of the week: April 24, 2020
Trustwave Security Colony delivers resources, playbooks and expertise to bolster security posture Trustwave Security Colony is based on thousands of hours of actual consulting …

Foiling content-borne attacks against a remote workforce
Opening a single email with a malicious URL or attachment can threaten your organization. In this interview, Liron Barak, CEO at BitDam, discusses the cybersecurity issue …

New infosec products of the week: April 17, 2020
NeuVector adds to container security platform, automates end-to-end vulnerability management The platform additions include the new Vulnerability and Compliance Explorer for …

Are we doing enough to protect connected cars?
Even though connected cars should meet the highest level of security, safety, and performance, we know this is not always the case. In this interview, Moshe Shlisel, CEO at …

Cybersecurity during the pandemic: Try these security solutions for free!
In order to help global organizations of all sizes address cybersecurity during the COVID-19 pandemic, a number of vendors provide free (time-limited) access to their …

Full-time bug hunting: Pros and cons of an emerging career
Being a bug hunter who discloses their discoveries to vendors (as opposed to selling the information to the highest bidder) has been and is an ambition of many ethical …

Threat detection and the evolution of AI-powered security solutions
Ashvin Kamaraju is a true industry leader. As CTO and VP of Engineering, he drives the technology strategy for Thales Cloud Protection & Licensing, leading a researchers …

How can you strengthen an enterprise third-party risk management program?
We sat down with Sean Cronin, CEO of ProcessUnity, to explore the challenges related to enterprise third-party risk today and in the future. What are the most unexpected …
Featured news
Resources
Don't miss
- Villain: Open-source framework for managing and enhancing reverse shells
- Securing the invisible: Supply chain security trends
- Why cyber resilience must be part of every organization’s DNA
- 44% of the zero-days exploited in 2024 were in enterprise solutions
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities