Please turn on your JavaScript for this page to function normally.
INTERPOL and the fast-paced digital threat landscape

Dr. Madan Oberoi is the Director of Cyber Innovation and Outreach Directorate at the INTERPOL Global Complex for Innovation in Singapore. In this interview he talks about the …

Identity theft prevention tips and assistance

Eva Casey-Velasquez is the CEO of the Identity Theft Resource Center, which provides victim assistance at no charge to consumers throughout the United States. They also …

How GitHub is redefining software development

The security industry is slowly realizing what the developer community knew for years – collaboration is the key to and likely the future of innovation. Even if …

Infosec management strategies and the modern CTO

Lumenta recently appointed Brandon Hoffman as their new CTO. We took this opportunity to get his perspective on the management strategies that are essential in the information …

Leveraging network intelligence and deep packet inspection

Tomer Saban is the CEO of WireX Systems, a provider of network intelligence solutions. In this interview he talks about how deep packet inspection helps with identifying …

The context-aware security lifecycle and the cloud

Ofer Wolf is the CEO at Sentrix, a provider of cloud-based web security solutions. In this interview he talks about the challenges of delivering enterprise-grade security, …

Fighting malware, emerging threats and AI

Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the …

How the threat landscape is shaping the network security business

Pat Calhoun is the Senior Vice President & General Manager, Network Security, at McAfee. In this interview he talks about constructing the strategic direction for …

Risk assessment benefits, best practices and pitfalls

Ryan Ward is CISO at Avatier. In this interview, he talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, …

The evolution of threat detection and Big Data

Mark Gazit is the CEO of ThetaRay, a specialist in threat detection. In this interview he talks about leveraging Big Data to secure networks, the advantages of using …

Job description: Infosec Ranger at Pwnie Express

When I learned that well-known hacker and conference speaker Jayson Street decided to join the Pwnie Express team, I knew this was the perfect time for an interview. …

Lessons learned developing Lynis, an open source security auditing tool

If you’ve been involved with information security for more than a decade, you’ve probably heard of Rootkit Hunter or rkhunter, a software whose primary goal is to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools