PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks
The management of identities and online authentication are two problems to which so far only Public Key Infrastructure (PKI) has managed to give a secure and scalable answer …
Risk management cookbook
The Open Group Security Forum completed a major risk management initiative with the publication of the Cookbook for ISO/IEC 27005:2005 (registration required). The cookbook is …
Building the Mobile Internet
It is common knowledge that the world is going mobile, and that we want to be able to connect to the Internet wherever we are. As the Internet’s original protocols and design …
Free e-book: Web Application Security for Dummies
Qualys announced that it has published a new comprehensive free guide on Web Application Scanning (WAS) to help readers understand web application security – including …
Data Breach and Encryption Handbook
Cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. A new book, Data Breach and Encryption Handbook, published by …
Free guide: Top 10 reports for managing vulnerabilities
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires …
Win a copy of Practical Lock Picking!
We are giving away two copies of “Practical Lock Picking“. For the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, …
New book: Troubleshooting Windows 7 Inside Out
You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …
Win a copy of Ninja Hacking!
We are giving away two copies of “Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques“. Throw traditional pen testing methods out the window …
New book: Managed Code Rootkits
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …
New book: Web Application Obfuscation
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take …
Featured news
Resources
Don't miss
- How global collaboration is hitting cybercriminals where it hurts
- Vet: Open-source software supply chain security tool
- Bankers Association’s attack on cybersecurity transparency
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac