Penny Hoelscher

Penny Hoelscher has a degree in journalism and a background in legacy programming. But, with an aversion to danger and conflict, she now combines interests in writing and IT safely from behind her computer screen.

20 of the most interesting companies to visit at Infosec Europe 2018
By in Sicurezza Informatica, on maggio 23, 2018 at 5:39 pm
20 of the most interesting companies to visit at Infosec Europe 2018

Here we give you the lowdown on the most interesting companies at Infosec Europe 2018. Infosecurity Europe (Infosec) is the region’s most exciting information security event, featuring a broad range of conference programs, scores of exhibitors (400+) and inspiring speakers, and thousands (19,500+) of cybersecurity professionals, IT movers and shakers, entrepreneurs, and influencers from around […]

13+ free pentesting tools
By in Sicurezza Informatica, on maggio 15, 2018 at 11:02 am
13+ free pentesting tools

Free pentesting tools are staples in an ethical hacker’s toolkit. Here we showcase the best and most popular open-source ones on the internet. We have also found some useful pentesting tutorials to get you started, and some challenging online exercises to practice your ethical hacking skills.

30+ free tools to improve security for your website and your visitors
By in Sicurezza Informatica, on dicembre 20, 2017 at 12:37 pm
30+ free tools to improve security for your website and your visitors

Cyberattacks are a daily occurrence and the concomitant costs for organizations are escalating. However, you can mitigate cyber disaster with free website security tools that will help you to identify website vulnerabilities and keep your visitors safe, or rather … safer.  One would think large enterprises have the means and opportunity to monitor their applications […]

BYOD security: What are the risks and how can they be mitigated?
By in Sicurezza Informatica, on novembre 5, 2017 at 2:28 pm
BYOD security: What are the risks and how can they be mitigated?

BYOD, and remote devices in general, carry a risk of data loss and data leakage. Here are some pointers on formulating a strategy to mitigate those risks.