Please turn on your JavaScript for this page to function normally.
Network Intrusion Analysis

What happens after a network intrusion is detected? What steps do you need to take? What is the proper way to react in a specific situation? The authors say their intention …

Information Security Risk Assessment Toolkit

It is a truth universally acknowledged that in order to know what company IT assets you should protect and how, you need to first perform a risk assessment. But how do to go …

Chat securely on Facebook with Synapsid

Synapsid is an iOS app that promises an encrypted chat experience on Facebook. In addition to having secure conversations, Synapsid allows you to: view friends profiles, …

Instant Apple Configurator How-to

Apple Configurator is a tool used for the mass configuration of iOS devices. With many large organizations adapting a variety of iOS devices into their daily workflow, it's …

Vulnerability scanning with PureCloud

nCircle PureCloud is a cloud-based network security scanning product built upon the companies' vulnerability and risk management system IP360.

Bad Data Handbook

The Bad Data Handbook is a collection of experiences of 19 different data scientists and experts, who share their methods of making data work for and not against them.

Online password management with my1login

In this day and age when everything moves from client computers to the cloud, a number of companies started providing online password management services. I recently attended …

Logging and Log Management

Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …

The Hacker’s Guide to OS X: Exploiting OS X from the Root Up

With increasing market share and popularity, OS X is getting more attention from cybercriminals and hackers alike. This book wants to ride on that rising success and provide …

Blackhatonomics: An Inside Look at the Economics of Cybercrime

If you need to get in the minds of cyber criminals to understand their motives and the economics of cyber crime, this book is enough to get you started.

Codeproof for iOS

Codeproof Technologie is a SaaS (Software-as-a-Service) provider from Redmond that offers a mobile device management (MDM) solution for Android and iOS devices. This review …

Cloud storage and sharing with MediaFire

MediaFire is a cloud storage service that enables you to store and share data. Read on to discover is features and learn how well it works.

Don't miss

Cybersecurity news