Black Code: Inside the Battle for Cyberspace
If anyone knows what's really going on in cyberspace and which forces threaten stability and security, it's Ronald Deibert and his colleagues from the well known and reputed …
Cloud Computing: Theory and Practice
Once a buzzword, cloud computing is now a part of nearly every modern IT infrastructure. Despite a variety of privacy, security and compliance concerns, companies large and …
Introduction to Cyber-Warfare
If you're looking to learn about cyber warfare, but don't know where to start, you might prefer picking up a book instead of searching for information dispersed on the …
Network Intrusion Analysis
What happens after a network intrusion is detected? What steps do you need to take? What is the proper way to react in a specific situation? The authors say their intention …
Information Security Risk Assessment Toolkit
It is a truth universally acknowledged that in order to know what company IT assets you should protect and how, you need to first perform a risk assessment. But how do to go …
Chat securely on Facebook with Synapsid
Synapsid is an iOS app that promises an encrypted chat experience on Facebook. In addition to having secure conversations, Synapsid allows you to: view friends profiles, …
Instant Apple Configurator How-to
Apple Configurator is a tool used for the mass configuration of iOS devices. With many large organizations adapting a variety of iOS devices into their daily workflow, it's …
Online password management with my1login
In this day and age when everything moves from client computers to the cloud, a number of companies started providing online password management services. I recently attended …
Logging and Log Management
Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …
The Hacker’s Guide to OS X: Exploiting OS X from the Root Up
With increasing market share and popularity, OS X is getting more attention from cybercriminals and hackers alike. This book wants to ride on that rising success and provide …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)