Review: GuardKey

Over the years, we’ve covered many encrypted USB dongles on Help Net Security. All of them provide high security for your data, encrypted and stored on the dongle …

O'Reilly DevOpsSec

Review: DevOpsSec

About the author Jim Bird, CTO of a major US-based institutional alternative trading system, has more than 20 years of experience in financial services technology, including …

ProtonMail

Review: ProtonMail

ProtonMail is an email service developed by a team of scientists who met while working at the European Organization for Nuclear Research (CERN) in Switzerland. The idea behind …

Signal

Review: Signal for iOS

Open Whisper Systems’ Signal is an encrypted voice and text communication application available for Android and iOS. The technology is built upon the …

Review: The Architecture of Privacy

Review: The Architecture of Privacy

About the authors Courtney Bowman has been working in the data analytics space for the last decade. He joined Palantir Technologies in 2010 as an in-house Privacy and Civil …

Car

Review: The Car Hacker’s Handbook

About the author Craig Smith runs Theia Labs, a research firm that focuses on security auditing and building hardware and software prototypes. He is also a founder of the …

Businessman

Review: Breaking into Information Security

Breaking into Information Security is a practical guide for people outside and inside the information security industry. The former can find out how to put their foot in the …

ICLOAK Pro

Review: ICLOAK Pro

Maintaining digital security and online privacy is difficult. As things move(d) online, cyber attacks of different kinds and magnitudes are constantly being mounted against …

mobile devices

Review: Mobile Data Loss

Employees increasingly use mobile devices for work and to access their company’s resources. That should be, by now, an accepted reality for all those who work in the IT …