Mirko Zorz

Plan for change but don’t leave security behind
COVID-19 has upended the way we do all things. In this interview, Mike Bursell, Chief Security Architect at Red Hat, shares his view of which IT security changes are ongoing …

How do I select a remote workforce protection solution for my business?
Recent research shows almost three quarters of large businesses believe remote working policies introduced to help stop the spread of COVID-19 are making their companies more …

Qualys Multi-Vector EDR: Protection across the entire threat lifecycle
Traditional endpoint detection and response (EDR) solutions focus only on endpoint activity to detect attacks. As a result, they lack the context to analyze attacks …

How do I select a password management solution for my business?
91 percent of people know that using the same password on multiple accounts is a security risk, yet 66 percent continue to use the same password anyway. IT security …

ERP security: Dispelling common misconceptions
Enterprise resource planning (ERP) systems are an indispensable tool for most businesses. They allow them to track business resources and commitments in real time and to …

New infosec products of the week: August 21, 2020
Kali Linux 2020.3 released: A new shell and a Bluetooth Arsenal for NetHunter Offensive Security has released Kali Linux 2020.3, the latest iteration of the popular open …

How do I select a risk assessment solution for my business?
One of the cornerstones of a security leader’s job is to successfully evaluate risk. A risk assessment is a thorough look at everything that can impact the security of …

New infosec products of the week: August 14, 2020
Ericom Application Isolator separates corporate apps from unauthorized users to prevent ransomware Ericom Software announced the introduction of Ericom Application Isolator, a …

New infosec products of the week: August 7, 2020
Radiflow launches CIARA, a ROI-driven risk assessment and management platform for industrial organizations CIARA is a fully automated tool for assets data collection, …

How do I select an endpoint protection solution for my business?
Endpoint protection has evolved to safeguard from complex malware and evolving zero-day threats. To select an appropriate endpoint protection solution for your business, you …

New infosec products of the week: July 31, 2020
Qualys unveils Multi-Vector EDR, a new approach to endpoint detection and response Traditional EDR solutions singularly focus on endpoints’ malicious activities to hunt and …

Delivering and maintaining security at the speed of digital transformation
Dustin Rigg Hillard, CTO at eSentire, is responsible for leading product development and technology innovation. His vision is rooted in simplifying and accelerating the …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)