
Building an Information Security Awareness Program
Are information security awareness programs a good thing or a complete waste of time? The debate around this question has been going on for a while and both sides have had …

Data Protection for Photographers
Today's high resolution digital cameras ensure that active photographers have to manage massive amounts of data. Keeping this data safe in the long run can present a …

Secure mobile messaging with Threema
If you're concerned about the privacy of your mobile communications, there's a variety of tools you can use to protect yourself. Today I'm taking a closer look at Threema, a …

Bulletproof SSL and TLS
Deploying SSL or TLS in a secure way is a great challenge for system administrators. This book aims to simplify that challenge by offering extensive knowledge and good advice …

Inside the ISO 27001 Documentation Toolkit
You work for a small or medium company and you'd like to become compliant, but budget is always an issue. The ISO 27001 Documentation Toolkit from 27001 Academy is here to …
Social Engineering Penetration Testing
We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets …
Targeted Cyber Attacks
Targeted cyber attacks against individuals, organizations, businesses, groups, and critical services happen every day around the globe. This book aims to tell you how …
Computer Incident Response and Forensics Team Management
In this day and age, it's only a matter of time when an organization's systems and networks will be breached by cyber attackers. Having an internal security incident response …
Penetration Testing: A Hands-On Introduction to Hacking
There are many people out there fascinated by the idea of penetration testing, but they believe they could never learn to do it, or haven't got a clue on where to start. This …
Web application penetration testing with ImmuniWeb
Switzerland-based ethical hacking and penetration testing experts High-Tech Bridge recently released an interesting security product that uses a hybrid approach towards web …
Secure public WiFi with avast! SecureLine for iOS
While constant Internet connectivity can be useful, it does create many privacy and security issues whose existence remains a mystery for the majority of mobile users. If you …
Featured news
Resources
Don't miss
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)