
Review: Cyber Minds
Humans are an essential part of any enterprise and should be considered the foundation of its cybersecurity. That’s probably easier said than done, but Shira Rubinoff has some …

Review: Enzoic for Active Directory
Seemingly every day news drops that a popular site with millions of users had been breached and its user database leaked online. Almost without fail, attackers try to use …

Review: Cyber Smart
Do you believe you’re not interesting or important enough to be targeted by a cybercriminal? Do you think your personal data doesn’t hold any value? Bart R. McDonough proves …

Review: Foundations of Information Security
Computers have become an essential part of everyday life, but this widespread usage comes with serious risks, especially for organizations. To address the issue, the author, …

Review: The Great Hack
Data is the most valuable asset/resource on Earth. Still, we have little or no control over who is exploiting ours without our consent. That is what the authors, Jehane …

Review: Cyberdanger
Whether you’re already familiar with cybersecurity or want to educate yourself on the topic, Cyberdanger is a great read. The author, Eddy Willems, is a well-known expert in …

Review: Specops uReset
Yes, it’s 2019 and we still have to deal with passwords. They should be replaced or supplemented with multi-factor authentication as soon as possible, but it looks like they …

Review: Specops Password Policy
All who work in the information security industry agree that passwords are one of the worst security nightmares of the modern information security age. Having weak passwords …

Review: The Absolute Platform with Persistence Technology
Absolute is a long-time player in the endpoint security arena, specializing in endpoint visibility and control. Regarded as an industry leader in IT asset management for more …

Review: EU GDPR Documentation Toolkit
The General Data Protection Regulation (GDPR) aims to strengthen data protection for all individuals within the EU (citizens and residents). It was adopted in April 2016, and …

Review: Cato Cloud
The Innovation Sandbox at the RSA Conference is one of the show’s events that I never miss. Back in February, I watched through the demos and live presentations of Cato …

Review: Pwnie Express Pulse
Pwnie Express Pulse is a SaaS offering that uses custom hardware sensors to provide continuous network discovery, threat detection, risk assessment, and critical information …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility