• Tresorit for Business

    | by Berislav Kucan - Thursday, 2 April 2015.

    In the cloud computing era, companies need to be proactive on secure collaboration and file sharing. Tresorit for Business is a solution that, among other things, helps organizations with managing, protecting and preventing leaks of their corporate data. The service provides end-to-end encryption for data in motion, along with all the enterprise functions related to managing user behavior and enforcing the policies for sharing the data in the most secure way possible.

  • Build A Security Culture

    | by Zeljka Zorz - Thursday, 26 March 2015.

    Kai Roer is one of the creators of the Security Culture Toolkit, a well-regarded framework that offers a structured approach to building and maintaining good security culture within your organization. In this book he leads the reader, slowly and methodically, towards achieving that goal.

  • Information Security Analytics

    | by Zeljka Zorz - Thursday, 8 January 2014.

    We've all heard about Big Data and security analytics as solutions to a variety of information security problems. This book explains what they are, how they work, and the value they can bring to businesses.

  • Detecting and Combating Malicious Email

    | by Zeljka Zorz - Monday, 5 January 2014.

    After years and years of security professionals explaining the dangers of malicious electronic messaging and how to avoid them, cyber crooks are still using them to compromise systems, meaning this method still works.

    This book takes a stab at spelling out clearly, in a plain language that even users with modest technical knowledge can understand, how to avoid becoming a victim of malicious messaging (emails, but also text messages, social media postings, etc.).

  • Python Forensics

    | by Matt Erasmus - Thursday, 18 December 2014.

    This book was touted as a "no-nonsense resource for the rapid development of new Python-based digital forensic applications." Given my deep love for Python and an interest in digital forensics, I had high hopes.


More than 900 embedded devices share hard-coded certs, SSH host keys

SEC Consult analyzed firmware images of more than 4000 embedded devices of over 70 vendors and found that, in some cases, there are nearly half a million devices on the web using the same certificate.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Nov 26th