Please turn on your JavaScript for this page to function normally.
Mission-Critical Security Planner: When Hackers Won’t Take No for an Answer

If you want to do security planning and you don't know where to start, this book is mandatory reading material. It will make your life easier and your system more secure.

Interview with Judy Novak, co-author of “Network Intrusion Detection 3/e”

Introduce yourself. I’m currently a senior security analyst for a consulting firm – Jacob and Sundstrom, but I’ll be changing jobs in about a month to become …

Interview with Ed Skoudis, author of “Counter Hack”

Introduce yourself. Hello. This is Ed Skoudis, security geek. How did you get interested in computer security? I’ve always loved to tear things apart. As a child, I …

Maximum Wireless Security

While wired networks have been around for ages and have had the time to make good security defences, wireless networks and new in comparison and still have a long way to go. …

Interview with Adam N. Bosnian, Vice President, Sales and Marketing of Elron Software

Adam N. Bosnian joined Elron Software in May 2000. Bosnian brings a strong background in sales, strategy development, corporate partnering, marketing communications, product …

Interview with Martin Croome, European General Manager of Socket Communications

Mr. Croome has held technical and marketing positions within the IT industry for the last 15 years including 11 years with Hewlett Packard in a number of different business …

Interview with Rich Bowen, co-author of Apache Administrator’s Handbook

Hi. I’m Rich Bowen. I live in Lexington, Kentucky, and have been in this area for about 15 years. In addition to the time that I spend on geek pursuits, I enjoy hiking …

NAI Unveils ‘InfiniStream Security Forensics’ Solution

InfiniStream Security Forensics is a forensics analysis solution that allows enterprise customers worldwide to reconstruct, understand and prevent harmful network activity and …

Interview with Charles R. Elden, co-author of “Wireless Security and Privacy”

Charles R. Elden is an independent security consultant. He has worked as a manager and software security consultant with Cigital’s Software Security Group. He has …

Interview with David W. Chapman, President and Principal Consultant for SecureNet Consulting

David W. Chapman Jr. is President and Principal consultant for SecureNet Consulting, LLC, an independent information security consulting firm in Beaverton, OR. SecureNet …

Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses

If you're in charge of the security of a network or just a security enthusiast, you'll find this book of great value. The specific tools and techniques described in this book …

Interview with Dr. Nicko van Someren, CTO of nCipher

nCipher’s CTO Dr. Nicko van Someren leads the research team and directs the technical development of nCipher products. Nicko has 20 years of experience in cryptography, …

Don't miss

Cybersecurity news