Syngressbook1,041 pagesComputers & TechnologyScience & Nature
Nessus, Snort, & Ethereal Power Tools
Brian Caswell, Jay Beale, Gilbert Ramirezbook472 pagesComputers & TechnologyScience & Nature
Cyber Adversary Characterization
Tom Parker, Marcus Sachs, Eric Shawbook356 pagesComputers & TechnologySociety & CultureScience & Nature
Hacking Web Apps
Mike Shemabook296 pagesComputers & TechnologyScience & Nature
Hack Proofing Your Identity In The Information Age
Syngressbook393 pagesScience & NatureComputers & TechnologyReligion
Combating Spyware in the Enterprise
Paul Piccardbook411 pagesComputers & TechnologyScience & NatureReligion
Rob Sheinbook363 pagesComputers & TechnologyMystery, Thriller & CrimeScience & Nature
Stealing the Network
Johnny Long, Ryan Russell, Timothy Mullenbook1,080 pagesComputers & Technology
Professional Penetration Testing
Thomas Wilhelmbook525 pagesComputers & TechnologyScience & Nature
Hacking a Terror Network
Russ Rogers, Matthew G Devostbook401 pagesComputers & TechnologyScience & NaturePolitics & Economy
Hack Attacks Revealed
John Chirillo, John Chirillobook961 pagesComputers & TechnologyScience & Nature
- Jan 16 20171 minute
No Winners In The Intelligence War
The president-elect’s feud with America’s spymasters helps neither side
- Oct 3 20163 minutes
Where Buying Data Is as Easy as Buying Cabbage
On China’s wild web, strict hardware and software controls make it harder to fend off cyber attacks | “It certainly doesn’t benefit the Chinese customer”
- Dec 19 20162 minutes
Charlie Rose Talks About … Cybersecurity
Former National Security Adviser Tom Donilon and retired IBM CEO Sam Palmisano, leaders of the national cybersecurity commission, discuss Russia’s role in the presidential election and the path to a safer digital future
- Feb 1 20138 minutes
How to Protect Your Small Business Against a Cyber Attack
Follow these steps to boost your company's security measures and thwart hackers -- keeping yourself, your employees and your customers safe.
- Jan 13 20172 minutes
Why Elections Are Now Classified As 'Critical Infrastructure'
President Obama’s homeland-security adviser hinted that it might help deter foreign cyberattacks.
- Dec 26 20163 minutes
The Yahoo! Hack Goes From Bad To Worse
Victims included FBI, CIA, NSA, and White House staffers | “It may really destroy your privacy ... without your knowledge”
- Oct 16 20161 minute
Remote-Control Killing: A Brief History
The U.S. Air Force established a “Pilotless Aircraft Branch” after World War II, and by Vietnam, we were using surveillance drones in full force. Six days after 9/11, Bush authorized the CIA to hunt down terrorists, which eventually led to a “kill li
- Sep 1 20161 minute
The Low-Tech Hack You're Not Prepared For
Haven't heard of visual hacking? It could be a real threat to your business, says Daniel Burks, senior VP and enterprise chief privacy officer for U.S. Bank.
- Nov 7 20163 minutes
A Shocking Internet Attack Shows America’s Vulnerability
THE INTERNET BEGAN TO WOBBLE AT 7 a.m. Early on Oct. 21, servers at a little-known Internet infrastructure company, Dyn, based in Manchester, N.H., began experiencing an overwhelming flood of malicious traffc. By midday a coordinated series of attack
- Dec 13 20162 minutes
Why Some People Think A Typo Cost Clinton The Election
A misleading email from a campaign staffer was just one mistake that helped Russian hackers steal data from Democrats.
- Sep 1 20142 minutes
Peace of Mind
Q: What kind of insurance does my business need?
- Jun 1 20144 minutes
Tips for Keeping Your Travels Identity Theft Free
Business trips are stressful enough without a side of identity fraud.
- Nov 21 201612 minutes
The Spy Who Added Me On Linkedin
FOR YEARS, RUSSIAN INTELLIGENCE HAD OPERATIVES HIDDEN INSIDE WALL STREET. JAMES BOND WORK IT WASN’T
- Nov 1 20142 minutes
Is My Data Really Safe? Your Questions About Cloud-Based Storage, Answered.
One expert shares tips to ensure your data stays safe and secure in the cloud.
- Jan 13 20176 minutes
Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?
It could be to prevent Trump from extending them even more.
- Dec 1 20152 minutes
For Cybersecurity Companies, It's Time to Shine
A growing crop of businesses is set on helping consumers and companies navigate the maze of threats.
- Dec 1 20151 minute
This Cybersecurity App Handles Your Company's Internal Weaknesses
DataGravity offers a unique solution to a common problem.
- Dec 30 20163 minutes
Will America's Nuclear Weapons Always Be Safe From Hackers?
The future arsenal will be networked, presenting unique security challenges for the U.S. Air Force.
- Feb 1 20152 minutes
Expert Advice: How to Up Your Cyber Security
What you need to know to fend off a hack attack
- Oct 14 20164 minutes
No Country For Edward Snowden
Opposition to a pardon for the NSA whistleblower has been widespread.
- Dec 12 20162 minutes
Trump Is Wrong That Investigators Have To Catch Hackers In The Act
Assigning blame for cyberattacks is difficult, but experts do often identify the culprits.
- Oct 24 20162 minutes
Battling Lone-Wolf Terrorists at Home
THE ARRAY OF terrorist actors is broader, wider and deeper than it has been at any time since Sept. 11, 2001. While I have great confidence in the U.S. counterterrorism architecture built in the past 15 years and the professionals we have trained, th
- Oct 10 20161 minute
India’s Cautious Kashmir Solution
New Delhi limits fallout from a militant attack, but more must be done for Kashmiris
- Jun 1 201619 minutes
Fear This Man
DAVID VIN CENZETTI BUILT A SPYWARE EMPIRE. IS THE ITALIAN MOGUL A CODE BREAKER OR AN ARMS DEALER?
- Sep 26 20162 minutes
Ups Unilever agreed to pay $700 million for Seventh Generation, a maker of plant-based cleaning products, which had about $200 million in sales last year. $266b Total currently invested in so-called 529 plans—the highest ever for the tax-exempt col
- Jan 13 20178 minutes
Former Intel Chief: Community Caught Between 'Scylla And Charybdis' On Trump Dossier
A conversation on intelligence and well-meant incompetence
- Sep 1 20163 minutes
How a new cybersecurity approach based on the human immune system could keep your data safe
- Jan 5 20175 minutes
How To Stop A Nuclear Missile
Lasers-armed drones and interceptor missiles are among America’s possible tech options for impeding a North Korean nuclear strike.
- Jan 11 20171 minute
Trump: 'I Think' Hacking Was Russian
The president-elect’s latest statement brought him closer to the position of the intelligence community.
- Oct 1 20162 minutes
Cyber Security Is A Shared Responsibility At The C-Level
Data breaches can have far-reaching repercussions; protecting against them is a companywide mandate