Reviews
  • CSA Guide to Cloud Computing

    | by Zeljka Zorz - Wednesday, 10 December 2014.

    The title says it all: this is a book that will tell you what cloud computing is, how best to take advantage of it, and what things you should be careful about when you do it.

  • Secure file storage and sharing with nCrypted Cloud

    | by Berislav Kucan - Thursday, 20 November 2014.

    The Ponemon Institute recently published a report stressing the fact that organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees. nCrypted Cloud is an interesting offering that tackles this and other threats by adding a strong security layer to the data used and shared via popular cloud-based data storage providers.

  • ESET Smart Security 8

    | by Berislav Kucan - Thursday, 13 November 2014.

    Well-known IT security company ESET recently announced major updates to its flagship products - NOD 32 Antivirus and ESET Smart Security. The most typical modern antivirus solutions nowadays provide much more than just anti malware functionality, but integrated solutions, such as their Smart Security offering, provide a much better level of security against ever-evolving threats.

  • Hacking and Penetration Testing with Low Power Devices

    | by Zeljka Zorz - Tuesday, 4 November 2014.

    This book is primarily intended for penetration testers who want to widen their skill set to include the knowledge of how to perform testing with small, low-powered devices that can be easily hidden in offices and boardrooms.

  • Building an Information Security Awareness Program

    | by Zeljka Zorz - Thursday, 16 October 2014.

    Are information security awareness programs a good thing or a complete waste of time? The debate around this question has been going on for a while and both sides have had some good arguments (and some bad, too). The authors of this book believe the former, and with this tome aim to show you how to build a security awareness program from the ground up.




Spotlight

eBook: Cybersecurity for Dummies

Posted on 16 December 2014.  |  APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Dec 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //