The disruption of Cryptolocker and GameoverZeus
Part of the difficulty in unraveling ZeuS botnet infrastructure is mapping it out. Attackers usually plant a generic dropper within an emailed file, disguised to look like a …
Improving training programs in cyber security
In this podcast, recorded at Hack In The Box Amsterdam 2014, Lisha Sterling, Developer Coordinator at Geeks Without Bounds, talks about the problems in cybersecurity …
Introducing the Security Culture Summer School
The infosec community has complained about awareness training failures and wasting time and effort on awareness trainings for quite some time. A consensus has emerged that for …
What inspired you to start hacking?
This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, …
Keeping your data secure while on the move
John Michael is the CEO at iStorage, a provider of secure portable data storage. In this interview he discusses the often overlooked repercussions of data loss, offers tips …
Inside the malware war zone
Adam Kujawa is the Head of Malware Intelligence for Malwarebytes. In this interview he talks about the evolution of malware in the past decade, illustrates the differences in …
Risk management issues, challenges and tips
Gary Alterson is the Senior Director, Risk and Advisory Services at Neohapsis. In this interview he discusses the most significant issues in risk management today, offers tips …
Online gaming threats and protection tips
In this podcast, recorded at Infosecurity Europe 2014, Christopher Boyd, Malware Intelligence Analyst at Malwarebytes, talks about online scams and phishing attacks, …
Small businesses and the cloud: How to mitigate the risks
Security concerns are still preventing many small businesses from using new technology methods to accelerate growth. The cloud is one major example of a “hot …
Change auditing and Netwrix Auditor
Michael Fimin is the CEO of Netwrix. In this interview he talks about the importance of change auditing and outlines the features of Netwrix Auditor. Why should organizations …
What is the key to IT program management?
The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, inc. …
Using ITOA to secure endpoints
Businesses today invest heavily in security technology in an effort to protect the most vulnerable aspects of their IT infrastructure – the endpoints and end-user …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring