![becrypt tvolution](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194833/becrypt-tvolution-400x200.jpg)
Using tVolution Mini, a portable secure desktop
tVolution Mini is Becrypt’s answer to the increased threats associated with remote working. It is a smart thin client solution that comes in the form of an extremely …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Cloud Storage Security, A Practical Guide
Authors: Aaron Wheeler and Michael WinburnPages: 144 pagesPublisher: ElsevierISBN: 0128029307 Introduction Practically everybody keeps at least some of their data in the …
![nowsecure lab](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194829/nowsecure-lab-400x200.png)
NowSecure Lab cloud: Mobile app assessment environment
NowSecure was one of the companies that caught my attention at this year’s RSA Conference in San Francisco. While it initially seemed like a new player in the field, the …
![raspberry pi](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194827/raspberrypi-400x200.png)
Penetration Testing With Raspberry Pi
Authors: Joseph Muniz, Aamir LakhaniPages: 142 pagesPublisher: Packt PublishingISBN: 1784396435 Introduction Raspberry Pi is a small and portable single board computer that …
![Scany](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194825/scany-400x200.jpg)
Scany: Network scanner for iOS
Over the past five years I tested quite a few iOS applications that could be used for providing quick snaps of the local network. Most of them were free applications and very …
![Tresorit](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194824/tresorit-400x200.png)
Tresorit for Business
In the cloud computing era, companies need to be proactive on secure collaboration and file sharing. Tresorit for Business is a solution that, among other things, helps …
![Build A Security Culture](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194823/book-security_culture-400x200.jpg)
Review: Build A Security Culture
Author: Kai Roer Pages: 124 Publisher: IT Governance Publishing ISBN: 1849287163 Introduction Kai Roer is one of the creators of the Security Culture Toolkit, a well-regarded …
![analytics](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194820/analytics-400x200.jpg)
Information Security Analytics
Authors: Mark Talabis, Robert McPherson, I. Miyamoto, Jason Martin Pages: 182 Publisher: Syngress ISBN: 0128002077 Introduction We’ve all heard about Big Data and …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194817/email-1-400x200.jpg)
Detecting and Combating Malicious Email
Authors: Julie JCH Ryan and Cade Kamachi Pages: 94 Publisher: Syngress ISBN: 0128001100 Introduction After years and years of security professionals explaining the dangers of …
![python](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194815/python-400x200.png)
Python Forensics
Author: Chet Hosmer Pages: 352 Publisher: Syngress ISBN: 0124186769 Introduction This book was touted as a “no-nonsense resource for the rapid development of new …
![Cloud lock](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195700/twitter-cloud5-400x200.jpg)
CSA Guide to Cloud Computing
Authors: Raj Samani, Brian Honan, Jim Reavis Pages: 236 Publisher: Syngress ISBN: 0124201253 Introduction The title says it all: this is a book that will tell you what cloud …
![nCrypted Cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194812/ncrypted-cloud-399x200.jpg)
Secure file storage and sharing with nCrypted Cloud
The Ponemon Institute recently published a report stressing the fact that organisational leadership is failing to respond to the escalating risk of ungoverned file sharing …
Featured news
Sponsored
Don't miss
- Shuffle Automation: Open-source security automation platform
- Cyber insurance 2.0: The systemic changes required for future security
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization