Author Archives: Mirko Zorz

CISO challenges and the path to cutting edge security

Zane Lackey is the co-founder and CSO at Signal Sciences, and the author of Building a Modern Security Program (O’Reilly Media). He serves on multiple Advisory Boards including the National Technology Security Coalition, the Internet Bug Bounty Program, and the US State Department-backed Open Technology Fund. Prior to co-founding Signal Sciences, Zane lead a security team at the forefront of the DevOps/Cloud shift as CISO of Etsy. In this interview with Help Net Security he … More

The post CISO challenges and the path to cutting edge security appeared first on Help Net Security.

New infosec products of the week: December 7, 2018

Juniper Networks updates JATP Appliances to prioritize cyber threats from any security source Juniper Networks released new offerings as part of its Juniper Networks Advanced Threat Prevention (JATP) Appliances, enabling enterprises to detect malware, understand behavior and mitigate threats with just one touch. This solution leverages data from any third-party firewall or security data source, avoiding unnecessary vendor lock-in. Eliminating complex, time-consuming data collection configurations, Juniper is helping security teams improve their organization’s security posture … More

The post New infosec products of the week: December 7, 2018 appeared first on Help Net Security.

(IN)SECURE Magazine issue 60 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 60 has been released today. Table of contents How to make the CFO your best cybersecurity friend Review: Specops Password Policy Break out of malware myopia by focusing on the fundamentals Securing our future in the age of IoT Blind spots and how to see them: Observability in a serverless environment There are no real shortcuts to most … More

The post (IN)SECURE Magazine issue 60 released appeared first on Help Net Security.

Industry reactions to the enormous Marriott data breach

On September 8, 2018, Marriott received an alert from an internal security tool regarding an attempt to access the Starwood guest reservation database in the United States. Marriott engaged security experts to help determine what occurred. Marriott learned during the investigation that there had been unauthorized access to the Starwood network since 2014. The company recently discovered that an unauthorized party had copied and encrypted information, and took steps towards removing it. On November 19, … More

The post Industry reactions to the enormous Marriott data breach appeared first on Help Net Security.

Photos: HITBSecConf2018 Dubai, part two

After an 8-year gap, the Hack In The Box conference once again opened its doors in Dubai. The conference features a Capture the Flag competition, a technology exhibition with a focus area on IoT and blockchain related tech, a car hacking village, hardware related village and a space for makers and hackerspaces. There’s also CommSec – a free-to-attend track of 30 and 60-minute talks that are live streamed on YouTube.

The post Photos: HITBSecConf2018 Dubai, part two appeared first on Help Net Security.

Photos: HITBSecConf2018 Dubai

After an 8-year gap, the Hack In The Box conference once again opened its doors in Dubai. The conference features a Capture the Flag competition, a technology exhibition with a focus area on IoT and blockchain related tech, a car hacking village, hardware related village and a space for makers and hackerspaces. There’s also CommSec – a free-to-attend track of 30 and 60-minute talks that are live streamed on YouTube. Registration area Capture The Flag … More

The post Photos: HITBSecConf2018 Dubai appeared first on Help Net Security.