Please turn on your JavaScript for this page to function normally.
Why is residual risk so important?

The term “residual risk’ is mandatory in the risk management process according to ISO 27001, but is unfortunately very often used without appreciating the real …

ISO 27001 video tutorials

One of the biggest obstacles for companies starting to implement ISO 27001 is writing various documents required by this information security standard. Information Security …

Practical Malware Analysis

Malware. You know what it is. Perhaps you’ve even fought a malware infection or two. Wouldn’t it be nice if the good guys finally had one really complete guide to …

Microsoft Windows Operating System Essentials

Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System …

Making Embedded Systems

Embedded systems control many devices in common use today, from digital watches and iPods to traffic lights and the systems controlling nuclear power plants. Since …

Top reasons for IT layoffs in 2011

Based on the data obtained with the help of a data leakage control system, and an in-depth analysis of work time usage by staff, the specialists of Falcongaze analytical …

ISO 27001 benefits: How to obtain management support

As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …

Building Resilient IP Networks

More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is …

How online communication connects generations

AARP and Microsoft released “Connecting Generations,” a research report that examines how people of all ages are using online communication and social networking …

Planning for IPv6

With IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level …

Simple steps to ensure online safety

Resent research into internet use by teenagers conducted for GFI Software revealed that one in three parents do not know if Internet safety tips are being taught to their …

Network Warrior, 2nd Edition

If you are interested in knowing everything that you can possibly know about networking, chances are you were already urged to read Gary Donahue's Network Warrior. Four years …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools