Hackaday Links: September 25, 2022

Hackaday Links Column Banner

Looks like there’s trouble out at L2, where the James Webb Space Telescope suffered a mechanical anomaly back in August. The issue, which was just announced this week, involves only …read more Continue reading Hackaday Links: September 25, 2022

“Pwned”, the Book, is Finally Here!

Presently sponsored by: Kolide believes that maintaining endpoint security shouldn’t mean compromising employee privacy. Check out our manifesto: Honest Security.

The first time I ever wrote publicly about a company’s security vulnerabilities, my boss came to have a word with me after seeing my name in the news headlines.

One of the worst days I’ve ever had was right in the middle of the Have I

Continue reading “Pwned”, the Book, is Finally Here!

Introducing the book: If It’s Smart, It’s Vulnerable

All our devices and gadgets are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters… Continue reading Introducing the book: If It’s Smart, It’s Vulnerable

Introducing the book: Managing the Dynamic Nature of Cyber Security

In order to provide organizations with knowledge to lower their cyber risk, Dr. Sander Zeijlemaker, launched his book – “Managing the Dynamic Nature of Cyber Security: A future-proof strategy, this is how it works”. In this Help Net Security vide… Continue reading Introducing the book: Managing the Dynamic Nature of Cyber Security

How to design architecture for enterprise wireless security [Free book excerpt]

You can access content from Chapter 5 “Planning and Design for Secure Wireless”, and learn my 5-phase design methodology for wireless network and security.

MORE > Click the title to read the full article.

Continue reading How to design architecture for enterprise wireless security [Free book excerpt]

Implementing wireless security in the enterprise [TechTarget Interview]

Learn how to properly secure your enterprise wireless network while considering UX, zero trust and commonly overlooked architectural mistakes. Download a free excerpt from the book.

MORE > Click the title to read the full article.

Continue reading Implementing wireless security in the enterprise [TechTarget Interview]