
Review: Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your Own
About the author Dejan Kosutic is the author of numerous articles, tutorials, documentation templates, webinars, and courses about information security and business continuity …

Review: ProtonMail
ProtonMail is an email service developed by a team of scientists who met while working at the European Organization for Nuclear Research (CERN) in Switzerland. The idea behind …

Review: The Architecture of Privacy
About the authors Courtney Bowman has been working in the data analytics space for the last decade. He joined Palantir Technologies in 2010 as an in-house Privacy and Civil …

Review: The Information Systems Security Officer’s Guide, Third Edition
About the author Dr. Gerald Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security …

Review: The Car Hacker’s Handbook
About the author Craig Smith runs Theia Labs, a research firm that focuses on security auditing and building hardware and software prototypes. He is also a founder of the …

Review: Breaking into Information Security
Breaking into Information Security is a practical guide for people outside and inside the information security industry. The former can find out how to put their foot in the …

Review: Becoming a Global Chief Security Executive Officer
“If protecting a business were as simple as deploying technologies such as firewalls, intrusion detection systems, and secured development life cycle processes, or …

Review: ICLOAK Pro
Maintaining digital security and online privacy is difficult. As things move(d) online, cyber attacks of different kinds and magnitudes are constantly being mounted against …

Review: Mobile Data Loss
Employees increasingly use mobile devices for work and to access their company’s resources. That should be, by now, an accepted reality for all those who work in the IT …

Review: Automating Open Source Intelligence
Editors: Robert Layton and Paul Watters Pages: 222 Publisher: Syngress ISBN: 0128029161 Introduction You can discover a lot – too much, some believe – by digging …

Review: Google Hacking for Penetration Testers, Third Edition
Authors: Johnny Long, Bill Gardner, Justin Brown. Pages: 234 Publisher: Syngress ISBN: 0128029641 Introduction The Internet can be a great source of information, and Google …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)