Space is no longer the final frontier—it’s the next battleground for cybersecurity. As our reliance on space-based technologies grows, so does the threat landscape, with adversaries targeting satellites, ground stations, and critical infrastructure.
Want to discover what life in a SOC is really like – beyond the marketing and myths? Join us for a free one-hour training session with Antisyphon instructor, Hayden Covington, and other members of the Black Hills Information Security (BHIS) SOC team.
Are you triggered by your junior analysts’ requests for network diagrams or baseline device configurations? Are you easily offended by arcane questions about AV exception paths, approved authentication protocols, managed browser extensions and other things that most security teams don’t know? When institutional knowledge is seemingly impossible to come by due to silos, egos and status quo, folks get worn down over time and stop asking.
Many aspiring cybersecurity professionals dream of becoming a member of a Red Team one day, but it can be difficult to know exactly what skills, tools, and tactics to focus on to help make that dream a reality.
In this video, Michael Allen discusses innovative social engineering phishing tactics used in penetration testing, specifically focusing on the use of physical mail to bypass conventional digital security measures.
In this video, Andrew Krug discusses the latest advancements in cloud security, focusing on new features introduced at AWS re:Invent and how they can help organizations enhance their security posture.
This Anti-Cast was originally aired on January 15, 2025. In this video, Tim Medin discusses the challenges and best practices of offensive and defensive security, emphasizing the importance of collaboration between red and blue teams. He covers a range of topics including password management, the …
n this video, Patterson Cake discusses the critical issue of business email compromise (BEC) and its implications on small to medium businesses. He shares real-life examples of how BEC has led to significant financial losses and the common tactics used by threat actors, such as phishing and identity theft.
In this video, Amanda and Zach discuss the challenges and solutions for cybersecurity in small and medium-sized businesses (SMBs) and managed service providers (MSPs).