Infosecurity Reviews

  1. Review: CrimeDotCom - From Viruses to Vote Rigging, How Hacking Went Global

    A review of Geoff White's look at the evolution of hacking

  2. Review: Conquer The Web - The Ultimate Cybersecurity Guide

    A review of the collaborative book on best practices, example scenarios and practical advice.

    1. Photo of Gregory Parfitt

      Gregory Parfitt

      Application Security Specialist

  3. Review: Lessons Learned: Critical Information Infrastructure Protection

    Reviewing a how-to for information security professionals on how to manage critical information infrastructure.

    1. Photo of Gregory Parfitt

      Gregory Parfitt

      Application Security Specialist

  4. Review: "Multi Factor Authentication for Dummies"

    The authors of the book have made sure to keep the content of the book highly consumable, even for the most novice of reader, using relatable and easy to understand examples of the concepts in practice.

    1. Photo of Chris Payne

      Chris Payne

      Managing Director, Advanced Cyber Solutions

  5. Review: "Serious Cryptography- A Practical Introduction to Modern Encryption"

    A review of Serious Cryptography – A Practical Introduction to Modern Encryption written by Jean-Philippe Aumasson,

    1. Photo of Gregory Parfitt

      Gregory Parfitt

      Application Security Specialist

  6. Review: "Industrial Cyber Security for Dummies"

    This book may be for Dummies, but any security professional in the utility sector will likely already have a deeper knowledge of ICS than this book offers.

    1. Photo of Ken Munro

      Ken Munro

      Partner, Pen Test Partners

  7. Review: "Gray Hat C# - A Hackers Guide to Creating and Automating Security Tools"

    A review of "Gray Hat C# - A Hackers Guide to Creating and Automating Security Tools".

    1. Photo of Gregory Parfitt

      Gregory Parfitt

      Application Security Specialist

  8. Review: "Navigating The Digital Age: The Definitive Cybersecurity Guide for Directors and Officers "

    For technical practioners it's a useful insight into how non-technical defenders think, for experienced cyber professionals it contains quotable supporting text combined with reassurance that the industry is finally changing

    1. Photo of Nick Drage

      Nick Drage

      Principal Security Consultant, Path Dependence Limited

  9. Review: 'Internet Security Fundamentals'

    'Internet Security Fundamentals' by Nick Ioannou provides a comprehensive outline of the most common internet security threats an average user may face on a daily basis.

    1. Photo of Gregory Parfitt

      Gregory Parfitt

      Application Security Specialist

  10. Review: 'Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect their Businesses'

    Managing Cybersecurity Risk is a comprehensive and engrossing guide for organizations, of any size, that are yet to fully appreciate their exposure to an ever-growing landscape of cyber-threats

    1. Photo of Gregory Parfitt

      Gregory Parfitt

      Application Security Specialist

  11. Review: 'The Car Hackers Handbook'

    The Internet of Things (IoT) is getting noticed within the security community as an area which needs much improvement. Overall, though, IoT devices are just mini versions of desktops and servers. They run Linux or Windows variants and connect via Bluetooth, Wi-Fi and Ethernet. There is one exception: cars.

    1. Jay Schulman

      Principal, security and privacy at RSM US LLP

  12. Review: 'Whaling for Beginners: Reputations'

    Whaling for Beginners: Reputations by Jerome Vincent is the second instalment in AXELOS’ novella series exploring the topic of ‘Whaling’, the use of phishing techniques to specifically target board-level executives within cybercrime

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. Review: 'Whaling for Beginners'

    This short story highlights the devastating impacts a cyber-attack can have on an organization’s hard won reputation, competitive advantage and market value.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. Review: The CISSP Companion You Can’t Do Without

    Shan Lee finds there is much to learn from Javvad Malik’s humor in his new e-book "The CISSP Companion Handbook"

    1. Shan Lee

      Head of Information Security

  15. Review: A Password System that Favors Puzzle Over Ease

    Bruce Marshall finds that one book offers up anything but an easy password creation system

    1. Bruce Marshall

      Researcher and Consultant at Password Research

  16. Review: Making Smart Grid Cybersecurity Accessible

    Áine MacDermott finds "Applied Cyber Security and the Smart Grid" worth the time investment

What’s hot on Infosecurity Magazine?