Please turn on your JavaScript for this page to function normally.
IS Decisions UserLock
Review: IS Decisions UserLock

According to a Rapid7 survey, 90% of organizations are worried about compromised credentials and around 60% say they cannot catch these types of attacks. French IT security …

Boxcryptor
Review: Boxcryptor

Storing your data in the cloud comes with both positive and negative aspects. Boxcryptor is a solution that helps with this by encrypting your data on your device before it …

iStorage datAshur Pro
Review: iStorage datAshur Pro

Whenever I travel, I take data I might need with me on a secure USB flash drive. Ages ago, I would encrypt these files with GPG and move them to a generic USB drive. After …

iStorage diskAshur Pro
Review: iStorage diskAshur Pro

The iStorage diskAshur Pro is a hard drive for users with security on their mind. This USB 3.0 device comes in various storage capacities, ranging from 500GB to 2TB, and is …

Linux Server Security
Review: Linux Server Security

About the author Chris Binnie is a Technical Consultant with 20 years of experience working with Linux systems, and a writer for Linux Magazine and Admin Magazine. He built an …

Review: GuardKey

Over the years, we’ve covered many encrypted USB dongles on Help Net Security. All of them provide high security for your data, encrypted and stored on the dongle …

Review: Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your Own

About the author Dejan Kosutic is the author of numerous articles, tutorials, documentation templates, webinars, and courses about information security and business continuity …

ProtonMail
Review: ProtonMail

ProtonMail is an email service developed by a team of scientists who met while working at the European Organization for Nuclear Research (CERN) in Switzerland. The idea behind …

Review: The Architecture of Privacy
Review: The Architecture of Privacy

About the authors Courtney Bowman has been working in the data analytics space for the last decade. He joined Palantir Technologies in 2010 as an in-house Privacy and Civil …

The Information Systems Security Officer's Guide, Third Edition
Review: The Information Systems Security Officer’s Guide, Third Edition

About the author Dr. Gerald Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security …

Car
Review: The Car Hacker’s Handbook

About the author Craig Smith runs Theia Labs, a research firm that focuses on security auditing and building hardware and software prototypes. He is also a founder of the …

Businessman
Review: Breaking into Information Security

Breaking into Information Security is a practical guide for people outside and inside the information security industry. The former can find out how to put their foot in the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools