
Review: The Basics of Cyber Safety
About the authors John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in …

Review: IS Decisions UserLock
According to a Rapid7 survey, 90% of organizations are worried about compromised credentials and around 60% say they cannot catch these types of attacks. French IT security …

Review: Threat Forecasting
About the authors John Pirc is Director of Security Solutions for Forsythe Technology and an advisor to HP’s CISO on Cyber Security. David DeSanto is the Director, Products …

Review: FourV Systems GreySpark
GreySpark is a solution for measuring and managing organizations’ IT security risk. GreySpark ingests information security metadata from a large range of existing …

Review: Boxcryptor
Storing your data in the cloud comes with both positive and negative aspects. Boxcryptor is a solution that helps with this by encrypting your data on your device before it …

Review: Protecting Patient Information
About the author Paul Cerrato has more than 30 years of experience working in healthcare and has written extensively on patient care, electronic health records, protected …

Review: iStorage datAshur Pro
Whenever I travel, I take data I might need with me on a secure USB flash drive. Ages ago, I would encrypt these files with GPG and move them to a generic USB drive. After …

Review: Cyber Guerilla
About the authors Jelle Van Haaster is an officer in the Royal Netherlands Army and has a background in legal, military, and technical defense matters. Rickey Gevers is …

Review: True Key for iOS
I’ve been using 1Password for years – both their desktop and mobile products. Altough it works fine, I was curious to see what are the alternatives I can use on my …

Review: iStorage diskAshur Pro
The iStorage diskAshur Pro is a hard drive for users with security on their mind. This USB 3.0 device comes in various storage capacities, ranging from 500GB to 2TB, and is …

Review: Linux Server Security
About the author Chris Binnie is a Technical Consultant with 20 years of experience working with Linux systems, and a writer for Linux Magazine and Admin Magazine. He built an …

Review: GuardKey
Over the years, we’ve covered many encrypted USB dongles on Help Net Security. All of them provide high security for your data, encrypted and stored on the dongle …
Featured news
Resources
Don't miss
- How to map and manage your cyber attack surface with EASM
- Google is making sending end-to-end encrypted emails easy
- North Korean IT workers set their sights on European organizations
- Balancing data protection and clinical usability in healthcare
- BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework