![Cyber Smart](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/04163014/book-cyber_smart-400x200.jpg)
Review: Cyber Smart
Do you believe you’re not interesting or important enough to be targeted by a cybercriminal? Do you think your personal data doesn’t hold any value? Bart R. McDonough proves …
![Review: Foundations of Information Security](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/18121238/review-fis-book-400x200.jpg)
Review: Foundations of Information Security
Computers have become an essential part of everyday life, but this widespread usage comes with serious risks, especially for organizations. To address the issue, the author, …
![The Great Hack](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092853/review_the_great_hack-400x200.jpg)
Review: The Great Hack
Data is the most valuable asset/resource on Earth. Still, we have little or no control over who is exploiting ours without our consent. That is what the authors, Jehane …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093318/cyberdanger-400x200.jpg)
Review: Cyberdanger
Whether you’re already familiar with cybersecurity or want to educate yourself on the topic, Cyberdanger is a great read. The author, Eddy Willems, is a well-known expert in …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094211/lock-400x200.jpg)
Review: Specops uReset
Yes, it’s 2019 and we still have to deal with passwords. They should be replaced or supplemented with multi-factor authentication as soon as possible, but it looks like they …
![Specops Password Policy](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095719/specops-password-policy-400x200.jpg)
Review: Specops Password Policy
All who work in the information security industry agree that passwords are one of the worst security nightmares of the modern information security age. Having weak passwords …
![Absolute Platform](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100542/absolute-platform-400x200.png)
Review: The Absolute Platform with Persistence Technology
Absolute is a long-time player in the endpoint security arena, specializing in endpoint visibility and control. Regarded as an industry leader in IT asset management for more …
![EU GDPR Documentation Toolkit](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102620/eu-gdpr-documentation-toolkit-400x200.jpg)
Review: EU GDPR Documentation Toolkit
The General Data Protection Regulation (GDPR) aims to strengthen data protection for all individuals within the EU (citizens and residents). It was adopted in April 2016, and …
![Cato Networks](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103615/cato_networks-400x200.jpg)
Review: Cato Cloud
The Innovation Sandbox at the RSA Conference is one of the show’s events that I never miss. Back in February, I watched through the demos and live presentations of Cato …
![Pwn Pulse](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103707/pwn_pulse-400x200.jpg)
Review: Pwnie Express Pulse
Pwnie Express Pulse is a SaaS offering that uses custom hardware sensors to provide continuous network discovery, threat detection, risk assessment, and critical information …
![Acunetix 11](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103723/Acunetix11-400x200.jpg)
Review: Acunetix 11
Acunetix is one of the biggest players in the web security arena. The European-based company released the first version of their product back in 2005, and thousands of clients …
![Book](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103732/featured-adv_per_sec-400x200.jpg)
Review: Advanced Persistent Security
About the authors Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD