Security

Get our award winning book for Free

Our award winning book which we wrote together with my very good frined Yuri, is know available for a limited time for free via our publisher and their partners “Cybersecurity – Attack and Defense Strategies ($20 Value) FREE For a Limited Time” All what you have to do is go to the below web site, login via LinkedIn or fill the [...]


Are you under attack ?

Dear Blog readers, In the last few months I started to receive more and more questions such as: “We are Hacked , please help” . As I have experienced this as a professional many many times and helped many customers during my career I decided to write this short blog post to help you start from somewhere. Even though this “ [...]


Posted By Category: SecurityTags: , , , , Comments: 0

34 Best Network Security Books of All Time

Based on Books Authority our “Cybersecurity Attack and Defense Strategies” Book which I co authored with my dear friend Yuri Diogenes is selected as number 2 in “34 Best Network Security Books of All Time” . This is really great news, we worked hard its always great to see an outcome like that. We would like to THANK all of [...]


Learn Social Engineering : New Book

I am pleased to announce that my new book “Learn Social Engineering” has just been published. A book which covers #SocialEngineering from A to Z & contains case studies from the field, as well as expert opinions. I would like to thank all the experts who have contributed in the book : https://www.packtpub.com/networking-and-servers/learn-social-engineering   Troy Hunt creator of haveibeenpwned.com Jonathan Trull Microsoft’s Global Chief [...]


How We Can Secure Cyberspace?

With cybercrime on the rise, companies have started adopting the hard ways of preventing system breaches. Cybersecurity has become the need of the hour. This article will explore how cyberattacks bring companies down to their knees giving rise to cybersecurity. The article also looks at some of the cybersecurity strategies that an organization can adopt to safeguard itself from [...]


Posted By Category: SecurityTags: Comments: 0