Mirko Zorz
Personal Firewalls for Administrators and Remote Users
Many users think that their personal computers are not susceptible to any kind of attack. Despite their belief, many computers, especially those behind a permanent broadband …
Interview with Christopher Alberts, a senior member of the technical staff in the Networked Systems Survivability Program at the Software Engineering Institute
Christopher Alberts is a senior member of the technical staff in the Networked Systems Survivability Program at the Software Engineering Institute (SEI). Before joining the …
A Practical Guide to Red Hat Linux 8
What you get with this massive book is a compendious guide to Red Hat Linux 8 that covers basically everything a Red Hat user might need. I can highly recommend it to both the …
IBM has released 6 new prep tutorials for DB2 Certification
The new tutorials will teach you the basics of the DB2 products and tools, DB2 security, and much more. You need to make a FREE registration to view the tutorials. Here they …
Interview with Carlisle Adams, Senior Cryptographer and Principal of Security at Entrust, Inc.
Carlisle Adams is recognized internationally for his many contributions to the design, specification, and standardization of public-key infrastructures. He is senior …
Managing Cisco Network Security
This book presents all the topics covered in the instructor-led certification preparation course with the same name - Managing Cisco Network Security (MCNS). The goal of this …
Interview with Eric Greenberg, author of “Mission-Critical Security Planner: When Hackers Won’t Take No for an Answer”
Who is Eric Greenberg? I’ve been kicking around the Internet for quite a while. Around 1981, while in college, I worked at the National Institutes of Health as a …
Interview with Aviel Rubin, Computer Science Professor at Johns Hopkins University and Technical Director of the JHU Information Security Institute
Introduce yourself. My name is Avi Rubin. I am a Computer Science Professor at Johns Hopkins University and Technical Director of the JHU Information Security Institute. I …
Interview with Cyrus Peikari, CEO of AirScanner Mobile Security
Dr. Peikari is the CEO of AirScanner Mobile Security and co-author of the book “Maximum Wireless Security” from SAMS Publishing. He finished his formal training …
Interview with Judy Novak, co-author of “Network Intrusion Detection 3/e”
Introduce yourself. I’m currently a senior security analyst for a consulting firm – Jacob and Sundstrom, but I’ll be changing jobs in about a month to become …
Interview with Ed Skoudis, author of “Counter Hack”
Introduce yourself. Hello. This is Ed Skoudis, security geek. How did you get interested in computer security? I’ve always loved to tear things apart. As a child, I …
Featured news
Resources
Don't miss
- April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft
- Forward-thinking CISOs are shining a light on shadow IT
- Inside the AI-driven threat landscape
- Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)
- Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)