Reviews
  • Penetration Testing With Raspberry Pi

    | by Berislav Kucan - Wednesday, 24 June 2015.

    Raspberry Pi is a small and portable single board computer that can be transformed into a penetration testing system. This book will show you how.

  • Scany: Network scanner for iOS

    | by Berislav Kucan - Monday, 1 June 2015.

    With Scany you can perform a wide range of sweeps: from scanning a simple local/remote host to scanning an IP range. With every scan you can go into details by selecting or even modifying one of the available preset scanning profiles.

  • Tresorit for Business

    | by Berislav Kucan - Thursday, 2 April 2015.

    In the cloud computing era, companies need to be proactive on secure collaboration and file sharing. Tresorit for Business is a solution that, among other things, helps organizations with managing, protecting and preventing leaks of their corporate data. The service provides end-to-end encryption for data in motion, along with all the enterprise functions related to managing user behavior and enforcing the policies for sharing the data in the most secure way possible.

  • Build A Security Culture

    | by Zeljka Zorz - Thursday, 26 March 2015.

    Kai Roer is one of the creators of the Security Culture Toolkit, a well-regarded framework that offers a structured approach to building and maintaining good security culture within your organization. In this book he leads the reader, slowly and methodically, towards achieving that goal.

  • Information Security Analytics

    | by Zeljka Zorz - Thursday, 8 January 2014.

    We've all heard about Big Data and security analytics as solutions to a variety of information security problems. This book explains what they are, how they work, and the value they can bring to businesses.




Spotlight

Why vulnerability disclosure shouldn’t be a marketing tool

Brian Honan, CEO at BH Consulting, talks about a recent vulnerability disclosure trend – a trend that he believes may ultimately cause more harm than good: security vendors using vulnerability disclosure as a marketing tool with the goal of enhancing their company’s bottom line.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Jul 2nd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //