Mirko Zorz
Ubuntu Unleashed (2nd Edition)
According to the 2007 Desktop Linux Survey, 30 percent of the respondents are using Ubuntu, and this makes it the most popular desktop Linux distribution. With such a large …
Security Metrics: Replacing Fear, Uncertainty, and Doubt
In the modern enterprise environment, investing in security and implementing is properly is a complex process that has to be based on certain metrics. Furthermore, how can one …
Interview with Jeremiah Grossman, CTO of WhiteHat Security
Jeremiah Grossman founded WhiteHat Security in 2001. Prior to WhiteHat, he was an Information Security Officer at Yahoo! responsible for performing security reviews on the …
Certified Ethical Hacker Exam Prep
This title takes you on a tour of all the areas you need to be proficient in to pass the Certified Ethical Hacker exam. If you manage to absorb everything in this book, and …
Interview with Edward Gibson, Chief Security Advisor at Microsoft UK
Mr. Gibson is the Chief Security Advisor for Microsoft in the UK. This role comes on the heels of his retirement from a 20-year career as a Supervisory Special Agent with the …
The Practice of System and Network Administration (2nd Edition)
Despite being thick as a phone book, you'll see that this title is very clearly organized and can serve not just as a learning tool but also as an effective reference guide …
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
With the proliferation of VoIP networks and a substantial amount of FUD (Fear, Uncertainty and Doubt) that surrounds the process of implementing security on these networks, …
Interview with Christen Krogh, Opera Software’s VP of Engineering
Christen Krogh is responsible for all software development at Opera. Krogh received his bachelor’s degree in computer science from Glasgow University and his Ph.D from …
Richard Rushing, AirDefense CSO, on Wireless Security
At the recent RSA Conference 2007 in San Francisco, AirDefense was doing wireless airwave monitoring. AirDefense found more than half of the 347 wireless devices susceptible …
Interview with Kurt Sauer, CSO of Skype
As Chief Security Officer at Skype Technologies, Kurt Sauer is focused on delivering trusted communications services via Skype’s platforms. Both the software delivered …
Jay Bavisi, President of EC-Council, on Ethical Hacking
We met with Jay Bavisi, President of EC-Council, at the RSA Conference 2007 in San Francisco. In this 07:20 video he talks about ethical hackers, the importance of …
Microsoft Chief Security Advisor Discusses Security Challenges and Windows Vista
Last week in London at the Infosecurity press conference, Ed Gibson, the Chief Security Advisor at Microsoft, shared his views on the security challenges the Redmond giant is …
Featured news
Resources
Don't miss
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)
- Exposure management is the answer to: “Am I working on the right things?”
- Cyberattacks are changing the game for major sports events
- Can your security stack handle AI that thinks for itself?
- July 2025 Patch Tuesday forecast: Take a break from the grind