![Specops Password Policy](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/03181230/review-specops-pp-400x200.jpg)
Review: Specops Password Policy
Specops Password Policy is a powerful tool for overcoming the limitations of the default password policies present in Microsoft Active Directory environments. To be fair, …
![Netsparker Enterprise](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/18164721/review-netsparker-enterprise-400x200.jpg)
Review: Netsparker Enterprise web application scanner
Vulnerability scanners can be a very useful addition to any development or operations process. Since a typical vulnerability scanner needs to detect vulnerabilities in …
![Practical Vulnerability Management](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/05132851/practical-vuln-management-book-400x200.jpg)
Review: Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
Andrew Magnusson started his information security career 20 years ago and he decided to offer the knowledge he accumulated through this book, to help the reader eliminate …
![ThreadFix](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/27151454/denimgroup-threadfix-400x200.jpg)
Review: ThreadFix 3.0
Maintaining a strong organizational security posture is a demanding task. Most best practices – e.g. CIS Controls, the OWASP Vulnerability Management Guide – …
![Web Security for Developers](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/11160910/websecurity_developers-book-400x200.jpg)
Review: Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald, with his 20 years of experience in programming, poured his knowledge into this book to offer comprehensive information about everything a developer needs to …
![Cyber Warfare - Truth, Tactics, and Strategies](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/26090614/review-cyberwarfare-400x200.jpg)
Review: Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism …
![Cybersecurity Threats, Malware Trends, and Strategies](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/05142857/book-tim_rains-400x200.jpg)
Review: Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains, who formerly held many essential roles at Microsoft and is currently working at Amazon Web Services as Regional Leader for Security and Compliance Business …
![Qualys VMDR](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/06105926/qualys-vmdr-400x200.jpg)
Review: Qualys VMDR
It’s 2020 and the importance of vulnerability management should go without saying. In fact, knowing your assets and performing continuous vulnerability management are two of …
![Kill Chain HBO](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27153202/killchain_hbo-400x200.jpg)
Review: Kill Chain: The Cyber War on America’s Elections
Kill Chain is an HBO documentary made and produced by Simon Arizzone, Russell Michaels and Sarah Teale. Kill Chain: Inside the documentary Arizzone and Michaels already worked …
![Cybersecurity – Attack and Defense Strategies - Second Edition](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/20162845/book-cybersecurity2e_packt-400x200.jpg)
Review: Cybersecurity – Attack and Defense Strategies
Yuri Diogenes, a professor at EC-Council University and Senior Program Manager at Microsoft, and Dr. Erdal Ozkaya, a prominent cybersecurity professional, advisor, author, …
![key](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092913/keys-400x200.jpg)
Review: Specops Key Recovery
Mobile device use continues to grow, while an increasingly mobile and remote workforce depends heavily on laptops. To secure those devices, organizations need to implement …
![Cyber Minds](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/05095212/review-cyber_minds-400x200.jpg)
Review: Cyber Minds
Humans are an essential part of any enterprise and should be considered the foundation of its cybersecurity. That’s probably easier said than done, but Shira Rubinoff has some …
Featured news
Sponsored
Don't miss
- Shuffle Automation: Open-source security automation platform
- Cyber insurance 2.0: The systemic changes required for future security
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization