The best penetration testing tools for ethical hackers

Top 5 penetration testing tools for ethical hackers

Software systems are vulnerable. That's down to a range of things, from the constant changes our software systems undergo, to the extent of the...
GDPR compliance

Microsoft Cloud Services get GDPR Enhancements

With the GDPR deadline looming closer everyday, Microsoft has started to apply General Data Protection Regulation (GDPR) to its cloud services. Microsoft recently announced...
Cyber Attacks

Top 5 cloud security threats to look out for in 2018

In the era of cloud deployment and DevOps, cloud adoption has seen a steady rise since 2017. Forbes report state that global public cloud...
Vevo’s YouTube account Hacked: Popular videos deleted

The evolution of cybercrime

A history of cybercrime As computer systems have now become integral to the daily functioning of businesses, organizations, governments, and individuals we have learned to...
What is Digital Forensics?

How cybersecurity can help us secure cyberspace

With cybercrime on the rise, companies have started adopting the hard ways of preventing system breaches. Cybersecurity has become the need of the hour....

What Blockchain Means for Security

It is estimated that hacks and flaws in security have cost the US over $445B every year. It is clear at this point that...

How to take a business-centric approach to security

Today’s enterprise is effectively borderless, because customers and suppliers transact from anywhere in the world, and previously siloed systems are converging on the core...

Why do so many companies fail to take cyber security seriously?

Consider this: in the past year cyber thieves have stolen $81m from the central bank of Bangladesh, derailed Verizon's $4.8 billion takeover of Yahoo,...

Getting Started with Metasploit

In this article by Nipun Jaswal, the author of the book Metasploit Bootcamp, we will be covering the following topics: Fundamentals of Metasploit Benefits of using...

Introduction to Cyber Extortion

In this article by Dhanya Thakkar, the author of the book Preventing Digital Extortion, explains how often we make the mistake of relying on...

Must Read in Security

Anatomy of a Crypto Ransomware

Crypto ransomware is the worst threat at present. There are a lot of variants in crypto ransomware. Only some make it into the limelight,...

Interviews