Please turn on your JavaScript for this page to function normally.
SSL/TLS deployment best practices

SSL/TLS is a deceptively simple technology. It is easy to deploy, and it just works-¦ except that it does not, really. The first part is true – SSL is easy to deploy …

The next step in BYOD security

The explosion in development and adoption of smartphones and tablets for both personal and business use in the past two years is both a blessing and a curse to IT departments …

Tips for combating online risks

To help consumers understand online risks and practice safe behaviors, Webroot security experts recommend the following: Phone home safely – Mobile malware is on the …

Five steps to enhance mobile device security

Mobile devices are quickly becoming a target rich and high return on investment environment for malicious attackers. Their use is expected to surpass the use of existing …

How Google Tests Software

Testing expert James Whittaker, a former Google testing leader, and two top Google experts reveal exactly how Google tests software, offering best practices you can use. How …

User activity monitoring crucial to minimizing security risks

In this ever evolving threat landscape, willing or unwitting insiders often play a key role in security compromises of organizations. It used to be that an …

How to do BYOD the right way

The massive proliferation of mobile devices and the employees’ tendency to prefer using devices they chose themselves has created quite a conundrum and challenges for …

ISO 27001 implementation: How to make it easier using ISO 9001

ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …

Penetration testing tips, tricks and unusual situations

Raul Siles is a senior security analyst with more than 10 years of expertise performing advanced security services. He is a SANS Institute author and instructor of penetration …

Learning iOS Programming, 2nd Edition

Get a rapid introduction to iPhone, iPad, and iPod touch programming. With this easy-to-follow guide, you’ll learn the steps necessary for developing your first …

Six ways to improve SCADA security

Industrial control systems (ICS), distributed control systems (DCS), supervisory control and data acquisition systems (SCADA) have all been around for decades, but thanks to …

The current challenges of being a CISO

In the last decade or so, the role of Chief Information Security Officer (CISO) was established in the great majority of business, government and non-profit organizations, and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools