ICLOAK Pro

Review: ICLOAK Pro

Maintaining digital security and online privacy is difficult. As things move(d) online, cyber attacks of different kinds and magnitudes are constantly being mounted against …

mobile devices

Review: Mobile Data Loss

Employees increasingly use mobile devices for work and to access their company’s resources. That should be, by now, an accepted reality for all those who work in the IT …

Review: Automating Open Source Intelligence

Editors: Robert Layton and Paul Watters Pages: 222 Publisher: Syngress ISBN: 0128029161 Introduction You can discover a lot – too much, some believe – by digging …

Keyboard

Next Generation Red Teaming

Author: Henry DalzielPages: 46Publisher: SyngressISBN: 0128041714 Introduction Do you know the difference between penetration testing and red teaming? This book will explain …

becrypt tvolution

Using tVolution Mini, a portable secure desktop

tVolution Mini is Becrypt’s answer to the increased threats associated with remote working. It is a smart thin client solution that comes in the form of an extremely …

cloud binary

Cloud Storage Security, A Practical Guide

Authors: Aaron Wheeler and Michael WinburnPages: 144 pagesPublisher: ElsevierISBN: 0128029307 Introduction Practically everybody keeps at least some of their data in the …