Please turn on your JavaScript for this page to function normally.
Cybersecurity – Attack and Defense Strategies - Second Edition
Review: Cybersecurity – Attack and Defense Strategies

Yuri Diogenes, a professor at EC-Council University and Senior Program Manager at Microsoft, and Dr. Erdal Ozkaya, a prominent cybersecurity professional, advisor, author, …

Review: Foundations of Information Security
Review: Foundations of Information Security

Computers have become an essential part of everyday life, but this widespread usage comes with serious risks, especially for organizations. To address the issue, the author, …

Tribe of Hackers
70 real-life hackers and cybersecurity practitioners share their personal insights

Entering the information security industry can be a formidable undertaking and renowned professionals often seem larger than life and unapproachable (even though most are on …

industrial
Strategies for expertly protecting industrial control systems

Andrew Ginter is the Vice President of Industrial Security at Waterfall Security Solutions. We sat down with him to learn more about his new book, Secure Operations …

Book
Review: Advanced Persistent Security

About the authors Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli …

Review: Data Breach Preparation and Response
Review: Data Breach Preparation and Response

About the author Kevvie Fowler is a Partner and National Cyber Response Leader for KPMG Canada and has over 19 years of IT security and forensics experience. He is a SANS …

The Internet of Risky Things
Review: The Internet of Risky Things

About the author Professor Sean Smith is the Principal Investigator of the Dartmouth Trust Lab and Director of Dartmouth’s Institute for Security, Technology, and …

DNS Security
Review: DNS Security

About the authors Allan Liska is a Consulting Systems Engineer at FireEye, and Geoffrey Stowe is an Engineering Lead at Palantir Technologies. Inside DNS Security: Defending …

Review: Protecting Patient Information
Review: Protecting Patient Information

About the author Paul Cerrato has more than 30 years of experience working in healthcare and has written extensively on patient care, electronic health records, protected …

Book: Cyber Guerilla
Review: Cyber Guerilla

About the authors Jelle Van Haaster is an officer in the Royal Netherlands Army and has a background in legal, military, and technical defense matters. Rickey Gevers is …

Linux Server Security
Review: Linux Server Security

About the author Chris Binnie is a Technical Consultant with 20 years of experience working with Linux systems, and a writer for Linux Magazine and Admin Magazine. He built an …

Review: Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your Own

About the author Dejan Kosutic is the author of numerous articles, tutorials, documentation templates, webinars, and courses about information security and business continuity …

Don't miss

Cybersecurity news