Please turn on your JavaScript for this page to function normally.
Free eBook: 9 Steps to Cybersecurity

9 Steps to Cybersecurity from expert Dejan Kosutic is a free e-book designed specifically to take you through cybersecurity basics. Aimed at people with limited prior …

Hypervisor-based, hardware-assisted system monitoring

In the last few years, many different techniques have been introduced to analyse malicious binary executables. Most of these techniques take advantage of Virtual Machine …

How to address the main concerns with ISO 27001 implementation

Recently I delivered two webinars on the topic of ISO 27001, and I have asked the attendees to send me their top concerns regarding ISO 27001 implementation before those …

Tips for protecting your personal and business data

As the risk of security breaches continues to become more prevalent, it is increasingly important that consumers and organizations protect their confidential information. …

A primer on breaking game console security

Are you interested to learn about the delicate hacks and tricks that go on behind the curtains of the scene better known as the console hacking scene? In this podcast recorded …

Five keys to small business cyber safety

According to The Ponemon Institute, 55 percent of small businesses experienced at least one data breach in 2012 and 53 percent had multiple breaches. Yet, a recent study by …

ISO 27001 standard benefits, implementation tips and security controls

Dejan Kosutic is an expert in information security management and business continuity management. In this interview he talks about the key changes in the ISO 27001: 2013 …

Characteristics of effective security leaders

A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic …

What has changed in ISO 27001?

Learn what has changed in ISO 27001 using this easy to understand infographic, click the image to get the complete version: The key differences are detailed including: Most …

Free eBook: OpenSSL Cookbook

If your job has something to do with security, web development, or system administration, you can’t avoid having to deal with OpenSSL on at least some level. This book …

Nmap cheat sheet

Network Mapper – better known by its shortened name Nmap – is one of the most long-lived security tools out there. Used for scanning computer networks for ports, …

A new classification for potentially unwanted mobile apps

What are PUAs (Potentially Unwanted Applications), and how should they be classified in the mobile (specifically Android) environment? PUAs are not technically malware, and …

Don't miss

Cybersecurity news