Businessman

Review: Breaking into Information Security

Breaking into Information Security is a practical guide for people outside and inside the information security industry. The former can find out how to put their foot in the …

ICLOAK Pro

Review: ICLOAK Pro

Maintaining digital security and online privacy is difficult. As things move(d) online, cyber attacks of different kinds and magnitudes are constantly being mounted against …

mobile devices

Review: Mobile Data Loss

Employees increasingly use mobile devices for work and to access their company’s resources. That should be, by now, an accepted reality for all those who work in the IT …

Review: Automating Open Source Intelligence

Editors: Robert Layton and Paul Watters Pages: 222 Publisher: Syngress ISBN: 0128029161 Introduction You can discover a lot – too much, some believe – by digging …

Keyboard

Next Generation Red Teaming

Author: Henry DalzielPages: 46Publisher: SyngressISBN: 0128041714 Introduction Do you know the difference between penetration testing and red teaming? This book will explain …

becrypt tvolution

Using tVolution Mini, a portable secure desktop

tVolution Mini is Becrypt’s answer to the increased threats associated with remote working. It is a smart thin client solution that comes in the form of an extremely …