Please turn on your JavaScript for this page to function normally.
Securing the virtual environment

In this video, Dimitri McKay, Security Architect at LogLogic, talks about vulnerabilities and the security challenges surrounding virtual environments: hyperjacking, VM …

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

If you followed our site over the years, you had the opportunity to read a little about some of the protagonists of this book: Max Vision the creator of CardersMarket, Albert …

IPv6 for Enterprise Networks

The February news that the last batch of IPv4 addresses has been distributed has resounded across the Internet as a final wake up call. It made everybody aware of the fact …

Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites

The only way you could have missed the fact that the social networking boom has led to huge amounts of social data becoming available to knowledgeable searchers is if you …

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks

The management of identities and online authentication are two problems to which so far only Public Key Infrastructure (PKI) has managed to give a secure and scalable answer …

Risk management cookbook

The Open Group Security Forum completed a major risk management initiative with the publication of the Cookbook for ISO/IEC 27005:2005 (registration required). The cookbook is …

Building the Mobile Internet

It is common knowledge that the world is going mobile, and that we want to be able to connect to the Internet wherever we are. As the Internet’s original protocols and design …

Free e-book: Web Application Security for Dummies

Qualys announced that it has published a new comprehensive free guide on Web Application Scanning (WAS) to help readers understand web application security – including …

Data Breach and Encryption Handbook

Cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. A new book, Data Breach and Encryption Handbook, published by …

Free guide: Top 10 reports for managing vulnerabilities

New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires …

Win a copy of Practical Lock Picking!

We are giving away two copies of “Practical Lock Picking“. For the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, …

New book: Troubleshooting Windows 7 Inside Out

You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …

Don't miss

Cybersecurity news