Please turn on your JavaScript for this page to function normally.
Specops Password Policy
Review: Specops Password Policy

Specops Password Policy is a powerful tool for overcoming the limitations of the default password policies present in Microsoft Active Directory environments. To be fair, …

Netsparker Enterprise
Review: Netsparker Enterprise web application scanner

Vulnerability scanners can be a very useful addition to any development or operations process. Since a typical vulnerability scanner needs to detect vulnerabilities in …

Practical Vulnerability Management
Review: Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

Andrew Magnusson started his information security career 20 years ago and he decided to offer the knowledge he accumulated through this book, to help the reader eliminate …

ThreadFix
Review: ThreadFix 3.0

Maintaining a strong organizational security posture is a demanding task. Most best practices – e.g. CIS Controls, the OWASP Vulnerability Management Guide – …

Web Security for Developers
Review: Web Security for Developers: Real Threats, Practical Defense

Malcolm McDonald, with his 20 years of experience in programming, poured his knowledge into this book to offer comprehensive information about everything a developer needs to …

Cyber Warfare - Truth, Tactics, and Strategies
Review: Cyber Warfare – Truth, Tactics, and Strategies

Dr. Chase Cunningham holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism …

Cybersecurity Threats, Malware Trends, and Strategies
Review: Cybersecurity Threats, Malware Trends, and Strategies

Tim Rains, who formerly held many essential roles at Microsoft and is currently working at Amazon Web Services as Regional Leader for Security and Compliance Business …

Qualys VMDR
Review: Qualys VMDR

It’s 2020 and the importance of vulnerability management should go without saying. In fact, knowing your assets and performing continuous vulnerability management are two of …

Kill Chain HBO
Review: Kill Chain: The Cyber War on America’s Elections

Kill Chain is an HBO documentary made and produced by Simon Arizzone, Russell Michaels and Sarah Teale. Kill Chain: Inside the documentary Arizzone and Michaels already worked …

Cybersecurity – Attack and Defense Strategies - Second Edition
Review: Cybersecurity – Attack and Defense Strategies

Yuri Diogenes, a professor at EC-Council University and Senior Program Manager at Microsoft, and Dr. Erdal Ozkaya, a prominent cybersecurity professional, advisor, author, …

key
Review: Specops Key Recovery

Mobile device use continues to grow, while an increasingly mobile and remote workforce depends heavily on laptops. To secure those devices, organizations need to implement …

Cyber Minds
Review: Cyber Minds

Humans are an essential part of any enterprise and should be considered the foundation of its cybersecurity. That’s probably easier said than done, but Shira Rubinoff has some …

Don't miss

Cybersecurity news