A Beginners Guide to Ethical Hacking – review SHYAAM SUNDHAR
Coranti – review MICHAEL MUNT
IPv6 Secure Transition Network Architecture MICHEL BARBEAU
IPv6 has the capability to handle an astronomically large address space. IPv6 deployment, although, has been marginal and several less drastic solutions have been used to expand the address space of IPv4. The non-drastic solutions have reached the limit of what they are able to handle. The transition to IPv6 is imminent.
Cloud Computing Legal Framework and Privacy REBECCA WYNN
The internet does not belong to one country or region. Therefore, international collaboration is a key area of focus and we need to continue to work with partners around the globe in support of our cybersecurity goals.
Howard A. Schmidt
An analysis of the cloud security threat JULIAN EVANS
The cloud is very much the talk of the IT media town these days. Client side computational resources are still in demand but IT vendors and businesses are looking to the cloud in the hope that third-party companies will manage the network infrastructure (including overload requirements whereby the company has to pay for additional hosting services) and data/network security.
Experts on Cloud Antivirus in the Cloud: fad or future?
by Malcolm Tuck, UK Managing Director, Kaspersky Lab Cloud Computing Standards: The Great Debate
Justin Pirie, Director of Communities and Content for Mimecast Cloud Security: Whose responsibility is it anyway?
by Rik Ferguson, Director of Security Research & Communications, Trend Micro EMEA
Video trainings + tutorial from Wayne Burke, Sequrit: