Instant Apple Configurator How-to
Apple Configurator is a tool used for the mass configuration of iOS devices. With many large organizations adapting a variety of iOS devices into their daily workflow, it's …
Logging and Log Management
Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …
The Hacker’s Guide to OS X: Exploiting OS X from the Root Up
With increasing market share and popularity, OS X is getting more attention from cybercriminals and hackers alike. This book wants to ride on that rising success and provide …
Instant Penetration Testing: Setting Up a Test Lab How-to
If you want to start practicing penetration testing, you will be needing a test lab. This book will tell you what you need in order to do it, how to set it up, and how to use …
Microsoft releases privacy and security guide for policy makers
Microsoft released the third volume of its popular policymaker booklet, Building Global Trust Online, which includes considerations and guidance for a number of new …
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
As I've always worked at small companies, I've been fascinated by the politics and problems experienced by those working for larger organizations. Surviving and thriving in …
Client-Side Attacks and Defense
Whether it's security vulnerabilities in software used by millions of home users and employees, or the natural human tendency to trust what comes at us, but even the most …
Wide Open Privacy: Strategies For The Digital Life
We live in a digital age where it's become normal to see people post photos of their credit cards online, parents share on Facebook images of their newborns right from the …
Advanced Persistent Threat
As more and more information becomes available and is stored in electronic form, the logical consequence is that APT actors will focus on breaching networks and systems on …
Windows 8 Inside Out
When Microsoft CEO Steve Ballmer launched Windows 8, he dubbed it a re-imagined operating system. When you introduce so many new features and a different UI, you're going to …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility