Recently acknowledged by Forrester as the strongest solution for Open Source Security, WhiteSource is an all-­in-one licensing, security, quality and reporting solution for managing open source components. In this interview CEO Rami Sass reveals the security challenges faced by open source developers, and explains how WhiteSource makes it all better.
Bitcoin and Blockchain Security is a fascinating book published in October 2016 by 2 leading-edge experts: Ghassan Karame, manager and chief researcher at NEC, and Elli Androulaki of IBM Research. The book gives a profound overview on next-generation payment systems, and the security challenges hindering widespread adoption of cryptocurrencies. In this article, Karame and Androulaki talk about the process of researching and writing the book, and give you a sneak preview to the first chapter, exclusive to vpnMentor!
Daniel Reis has spent over twenty five years working with major technology companies and customers to define and manage existing and new security products. Dan holds a Bachelor’s degree in economics, an MBA, and a Master’s in Information Systems Security. He spent many years working in network security protection systems and is now Director of Product Marketing with a global leader in threat intelligence. In this article we bring you the first chapter of his book Cybersecurity: Issues of Today, a Path for Tomorrow, where he explores topics organizations and security professionals wrestle with to deploy and maintain a robust secure environment.

Interview with TheSafety.US about VPNs

Ditsa Keren | Updated on 6th February 2020
Please provide some background on the company: what inspired you to start a VPN service and how did it come together? We started our business in 2006. Back then, VPNs were used by private companies to protect their local networks. VPN services were not circulated yet, and there were no more than about 50 VPN...
Peter Kim describes himself as heavily involved in the security community. He's spent the last ten years working as a penetration tester and incident responder for a variety of business sectors. On his free time, he manages a local hackerspace in Santa Monica, and writes about his research at the blog. His latest book, The Hacker Playbook 2: Practical Guide To Penetration Testing is a compilation of different methodologies that he's learned over the years, many of which he has presented at multiple security conferences over the years. In this article, Peter Kim gives vpnMentor readers a sneak preview to his book, which is available on Amazon in either Kindle or paperback edition.
Carey parker, the author of Firewalls Don’t Stop Dragons- A Step by Step Guide to Computer Security For Non-Techies has been a software engineer for about 24 years, and the informal 'IT guy' for his friends and family. In recent years, particularly after the Edward Snowden revelations in 2013, he became deeply concerned about computer security and privacy. " I've always had a knack for explaining technical topics to non-technical people, so I decided to write a book on cybersecurity for the masses", he explains. "Of course, I did plenty of research for the book and enhanced my general knowledge on the topic. But I think one of the most interesting things I learned was just how hopeless people feel about protecting themselves online. Computers and the Internet are fabulous tools, but most people feel they are completely beyond comprehension - and they just give up; My goal is to reach these people - explain what they need to know in a way that they understand, followed by simple and concrete steps they can take to vastly improve their personal security and privacy." In 2014, Parker combined his passion for computers, cybersecurity and fantasy novels with the long-time desire to write a book.
This April in Amsterdam, get ready to expand your knowledge with extraordinary lectures, training sessions and live demos from non-biased security researchers and professional hackers. We've spoken to one of the organizers to give you a short but sweet overview of the topics that are going to be presented, and what HITB is all about.
Dr. Mark Ciampa is an Associate Professor of Information Systems in the Gordon Ford College of Business at Western Kentucky University.  Prior to this he was an Associate Professor and served as the Director of Academic Computing at Volunteer State Community College in Gallatin, Tennessee for 20 years. Mark has worked in the IT industry as a computer consultant for the U.S. Postal Service, the Tennessee Municipal Technical Advisory Service, and the University of Tennessee.  He has published 17 articles in peer-reviewed journals and is also the author of over 23 technology textbooks, including Security+ Guide to Network Security Fundamentals 5ed, CWNA Guide to Wireless LANs 2ed, Guide to Wireless Communications, Security Awareness: Applying Practical Security In Your World 5ed, and Networking BASICS. Dr. Ciampa holds a PhD in technology management with a specialization in digital communication systems from Indiana State University and also has certifications in Security+ and HIT. We've had the pleasure of chatting with Mr. Ciampa about his work, followed by a sneak preview to his latest book CompTIA Security+ Guide to Network Security Fundamentals.
BolehVPN is a Seychelle based VPN provider that offers some advanced features, such as traffic obfuscation and military grade encryption. In this interview, we spoke to Reuben, co founder at BolehVPN, to hear his views on the state of internet privacy in 2017.
Mostafa Hashem Sherif  is the author of Protocols for Secure Electronic Commerce, where he presents a compendium of protocols for securing e-commerce platforms B2B and B2C applications. In this article, vpnMentor brings you the first chapter of this fascinating book, along with a few remarks from the author.