iPhone security software: Keeper Password & Data Vault
Keeper is yet another password management system for the iPhone platform. I tested the 3.2 version, released in late September 2009. The application requires around 5.4 MB for …
Espionage 2.5.4
Espionage is a discreet tool that integrates seamlessly with Apple's Finder, and its main "reason of being" is to protect individual folders and applications by encrypting its …
Beautiful Security: Leading Security Experts Explain How They Think
In Beautiful Security, a bevy of experts describe how they look at a particular aspect of information security. They offer the knowledge they have acquired through many years …
DigitalPersona Personal Premium
Since 1996, DigitalPersona delivers products that enable commercial enterprises, hardware OEMs, software ISVs and consumers to use fingerprint biometrics to secure their …
IronKey Personal
Military-grade hardware encryption safeguards your personal files while stealth Web browsing, anti-malware and password management protect your privacy and prevent identity …
SQL Injection Attacks and Defense
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It occurs when user input is either …
Web 2.0 Architectures
What is Web 2.0? There is still no definitive and all-encompassing definition for the phenomenon, and there probably never will be. One thing that is known for sure is that it …
The Bento Book: Beauty and Simplicity in Digital Organization
Bento is a database for people who need more than a spreadsheet, but less than a full-fledged complex database. It was designed with Mac users in mind, and integrates Mail, …
GFI Network Security and PCI Compliance Power Tools
GFI LANguard is one of the most deservedly popular commercial network security tools there is. It's an administrator's dream software, a "3 for 1 deal" - it finds, assess and …
Googling Security: How Much Does Google Know About You?
Have you ever thought about the price you pay for using Google's services? They say it's all for free, but you're actually paying for it by allowing them to collect personal …
97 Things Every Software Architect Should Know
Don't we all sometimes wish we could just TAKE good advice, instead of thinking we have found a better way and make the mistakes we've been warned about? This book is a …
Cyber Crime Fighters: Tales from the Trenches
Every new technology has the capacity to be used for good or for evil. And where is a new way to commit crimes, criminals will find it. That being said, this book covers the …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)