Please turn on your JavaScript for this page to function normally.
Engineering-grade OT security
Review: Engineering-grade OT security: A manager’s guide

Andrew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He holds a BSc. in Applied Mathematics and an MSc. in Computer …

Cyberbunker
Review: Cyberbunker: The Criminal Underworld

Written and directed by Kilian Lieb and Max Rainer, Cyberbunker is a Netflix documentary about a group of hackers that enabled the proliferation of dark web forums where …

Enzoic
Review: Enzoic for Active Directory

Data breaches now happen so often that we don’t even pause when reading yet another headline notifying us of the latest one. We react only if the breach happened to a service …

Hornetsecurity 365 Total Protection Enterprise Backup
Review: Hornetsecurity 365 Total Protection Enterprise Backup

Hornetsecurity 365 Total Protection Enterprise Backup is a cloud-based data protection and security solution that provides protection against spam, malware, and other advanced …

Group-IB Threat Intelligence & Attribution (TI&A)
Review: Group-IB Threat Intelligence & Attribution (TI&A)

Organizations and enterprises that care about business continuity should have an established security program that needs to be reviewed on a regular basis. One of the hardest …

Group-IB Digital Risk Protection
Review: Group-IB Digital Risk Protection

The COVID-19 pandemic has transformed our private and working lives. It has also forced companies to extend the network perimeter due to employees working from their homes and …

The Pentester Blueprint
Review: The Pentester Blueprint: Starting a Career as an Ethical Hacker

Brough to you by cybersecurity researcher Kim Crawley and pentester and author Phillip L. Wylie, The Pentester Blueprint gives insights into the most common hurdles …

Group-IB Threat Hunting Framework
Review: Group-IB Threat Hunting Framework

The IT infrastructure of larger organizations is very heterogeneous. They have endpoints, servers and mobile devices running various operating systems and accessing internal …

Code42 Incydr
Review: Code42 Incydr – SaaS data risk detection and response

Incydr is Code42’s new SaaS data risk detection and response solution, which enables security teams to mitigate file exposure and exfiltration risk without disrupting …

Alice & Bob Learn Application Security
Review: Alice & Bob Learn Application Security

Tanya Janca, founder of We Hack Purple, an online learning academy, community and podcast that teaches how to create secure software, is also known as SheHacksPurple and is …

The Perfect Weapon
Review: The Perfect Weapon

John Maggio, an award-winning producer, director, and writer, known for The Newspaperman: The Life and Times of Ben Bradlee (2017), Panic (2018), The Italian Americans (2015) …

Group-IB Fraud Hunting Platform
Review: Group-IB Fraud Hunting Platform

Today’s Internet is a hectic place. A lot of different web technologies and services are “glued together” and help users shop online, watch the newest movies, or stream the …

Don't miss

Cybersecurity news