Articles & Tutorials

View All RSS Feed

Last Updated on 5 Oct. 2016, Total: 859 Articles and Tutorials

189 Authentication, Access Control & Encryption
27 Cloud Computing
9 Content Security (Email & FTP)
29 Firewalls & VPNs
29 Intrusion Detection
245 Misc Network Security
14 Mobile Device Security
18 Product Reviews
38 Viruses, trojans and other malware
18 Web Application Security
17 Web Server Security
5 Windows 10 Security
33 Windows 2003 Security
7 Windows Networking
133 Windows OS Security
7 Windows Server 2008 Security
25 Windows Server 2012 Security
14 Wireless Security

Latest Articles and Tutorials

  • Drones - Another threat to security 5 Oct. 2016 Ricky M. & Monique L. Magalhaes

    The IoT is happening all around us. One such notable elaboration in this area is drones. Drones, also referred to as unmanned aircraft systems, are quickly finding their way into IoT applications. It is estimated that the drone market may exceed $80billion by 2025. The possibilities for this technology are great however the security concerns (both cybersecurity and physical) must be addressed. Above all, the software utilised must be certified for safety.

  • Application security redux: It’s All about the Apps (Part 8) 14 Sept. 2016 Deb Shinder

    In this, Part 8 and the last installment of our series, we will continue the application data protection story as we delve a little deeper into the challenges inherent in developing an effective data security strategy and particularly the problems of securing mobile device data and securing data that’s stored in the cloud.

  • Changing face of Compliance and data protection 7 Sept. 2016 Ricky M. & Monique L. Magalhaes

    The revised data protection laws for Europe have been agreed. By late May 2018 the regulation will be enforced - although at a glance this seems quite some time away, the amount of work and changes that most organisations must undertake to reach compliance with the new General Data Protection Regulation (GDPR) is extensive. We should not delay but rather begin preparations as soon as possible.

  • Security visibility in the cloud 10 Aug. 2016 Deb Shinder

    In this article, we’ll provide an overview of how Microsoft and Amazon are giving customers more visibility into and control over cloud security resources.

  • Azure Security Infrastructure 3 Aug. 2016 Deb Shinder

    This article provides you an inside look into the Network Security chapter in the upcoming book – Azure Security Infrastructure

Featured Links