Hire a Hacker
When tru sting your security to hackers is a good idea
How to use
Cybersecurity expertise for more than just experts
How to use
To navigate through the magazine use the on-screen page arrows or the right and left arrow keys on your keyboard. Use your mouse wheel or the scrollbars to read through each article.
On the bottom right of the page there are three menu buttons: home, contents and full screen. To return to this cover page you can either use the home or contents buttons, or click on the Verdict Encrypt logo at the top of each article.
Tablet and mobile
To navigate through the magazine, simply swipe right and left, or tap on the page arrows. To read an article, swipe up.
On tablets there are two menu buttons on the bottom right: home and contents. On mobile devices there is only contents.
To get back to the cover, either click home or the Verdict Encrypt logo located at the top of each article.
Uncovering The White Company: a Previously Unknown Threat Actor
Dark Web Recruitment: the Rules in the Web's Lawless Underbelly
GDPR Six Months On: Is it Working? Experts Have Their Say
The State of Medical Device Security in a World of Increasing Connectivity
Cybersecurity as a Service: Meet the Advanced MSSP Taking on Vendors