Securing web sites against Hackers

Web sites are frequent targets of Cyber Criminals and Hackers. This is especially the case for financial and online retail sites. So what are the best approaches to securing web sites against these types of attacks?Continue readingSecuring web sites against Hackers

Cyber Security reads

Here we have compiled a series of books & ebooks to read up on Cyber Security. They provide an introduction through to advanced topics on the threats, potential consequences, and mitigation techniques.Continue readingCyber Security reads

Cyber Crime audiobooks

In this article we have compiled a selection of Audiobooks covering Cyber Crimes and Cyber Wars. They cover the different hacking groups who have committed these acts together with the organizations tasked with tracking them down and countering the threats.Continue readingCyber Crime audiobooks

Does a Firewall protect against being hacked? (part 2)

In the second of a 2-part article we look at host-based and network-based firewall solutions. These can help form part of a security infrastructure to protect computers, devices and networks against being hacked.Continue readingDoes a Firewall protect against being hacked? (part 2)

Does a Firewall protect against being hacked? (part 1)

Cyber attacks come in many forms so in the first of a 2-part article we examine what is a firewall? We explain the different types of firewalls, then look at the sort of hacking attempts and cyber security attacks which a firewall can help protect against.Continue readingDoes a Firewall protect against being hacked? (part 1)

Cyber Security through Deception (part 2)

In this, the second of a 2-part article, we continue to look at Deception Technologies. We examine leading solutions using it to defend against Cyber Attacks.Continue readingCyber Security through Deception (part 2)

Cyber Security through Deception (part 1)

Here we look at what Deception Technology is. We examine the problems faced which may put it to good use. Then the tactics employed and related terminology.Continue readingCyber Security through Deception (part 1)

Privacy & Security via Tails & Qubes OS

Staying safe whilst using a computer is becoming more important by the day. Whether at home, work, or traveling your computer is vulnerable to being compromised. This article looks at 2 operating systems with a primary focus on privacy & security.Continue readingPrivacy & Security via Tails & Qubes OS

Living with a Password Manager (part 3)

In the final part of our article we find out how well 1Password stacks up as a Password Manager. We examine how well our password-related objectives are met across a range of scenarios.Continue readingLiving with a Password Manager (part 3)

Living with a Password Manager (part 2)

In this article we examine whether using a Password Manager helps make life easier to remember login credentials when accessing the Internet. We examine the everyday situation of using multiple apps and accessing a multitude of websites across a variety of Internet-enabled devices.Continue readingLiving with a Password Manager (part 2)