Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Space Cybersecurity: Why It Matters & What You Can Do

Space is no longer the final frontier—it’s the next battleground for cybersecurity. As our reliance on space-based technologies grows, so does the threat landscape, with adversaries targeting satellites, ground stations, and critical infrastructure.

The Realities of SOC Work

Want to discover what life in a SOC is really like – beyond the marketing and myths? Join us for a free one-hour training session with Antisyphon instructor, Hayden Covington, and other members of the Black Hills Information Security (BHIS) SOC team.

Casting Light on the Known Unknowns

Are you triggered by your junior analysts’ requests for network diagrams or baseline device configurations? Are you easily offended by arcane questions about AV exception paths, approved authentication protocols, managed browser extensions and other things that most security teams don’t know? When institutional knowledge is seemingly impossible to come by due to silos, egos and status quo, folks get worn down over time and stop asking.

Top 5 Red Team Skills for 2025

Many aspiring cybersecurity professionals dream of becoming a member of a Red Team one day, but it can be difficult to know exactly what skills, tools, and tactics to focus on to help make that dream a reality.

How to Bypass Modern Phishing Detections

In this video, Michael Allen discusses innovative social engineering phishing tactics used in penetration testing, specifically focusing on the use of physical mail to bypass conventional digital security measures.

Cloud Security Adoption Curves

In this video, Andrew Krug discusses the latest advancements in cloud security, focusing on new features introduced at AWS re:Invent and how they can help organizations enhance their security posture.

Offense for Defense w/ Tim Medin

This Anti-Cast was originally aired on January 15, 2025. In this video, Tim Medin discusses the challenges and best practices of offensive and defensive security, emphasizing the importance of collaboration between red and blue teams. He covers a range of topics including password management, the …

The Anatomy of M365 Business Email Compromise

n this video, Patterson Cake discusses the critical issue of business email compromise (BEC) and its implications on small to medium businesses. He shares real-life examples of how BEC has led to significant financial losses and the common tactics used by threat actors, such as phishing and identity theft.

Shopping Cart

No products in the cart.