
Search Results for: secure ideas
Live Events

Social Posts

Radioactive Vulnerabilities – Learn Secure Coding w/ Jennifer and Kathy
/// 🔗 Register for future Antisyphon Training Webcasts Here – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides https://www.antisyphontraining.com/wp-content/uploads/2024/03/2024_03_06_anticast_Radioactive-Vulnerabilities_Learn-Secure-Coding_Jennifer-and-Kathy.pdf Radioactive Vulnerabilities – Learn Secure Coding with Jennifer and Kathy Tune in to ‘Radioactive Vulnerabilities – Learn Secure Coding,’ a free one-hour Antisyphon Anti-Cast that shares the tragic story of the Therac-25 radiation therapy incidents…

Commitment Issues: The Yellow Brick Road to Secure Code | Jordan Mussman
00:00 – Welcome! 00:58 – Jordan’s Bio 01:30 – Why you should care about secure code 02:34 – Insecure code examples, detection methods 05:09 – Secure Code Definition 05:58 – Case studies (composite) 07:21 – Case Study 1: Poor user input sanitization 10:33 – Case Study 2: Developer instance open…
Pages

Antisyphon Training Presents Trainings by:
The Secure Ideas instructors have over two decades of experience in the technology and education industries, ranging from Penetration Testing and Software Development to Open Source Coding and AD Infrastructure. Whether you’re looking for a new certification and are in need of CPEs or just looking for ways to improve…

About Antisyphon Training
…Training Antisyphon Training emerged as a response to the growing demand for approachable, accessible, and affordable education. The courses are designed to bridge the gap between theoretical understanding and practical application in the field of cybersecurity. Our industry-leading instructors come from: BHIS Secure Ideas Red Siege US Military Our Course…
Blog Posts

Your Active DAD (Active Domain Active Defense) Primer
…maintenance moving forward. So why we’re doing this is trying to prime the pump right, get ideas flowing. One of the things that we think is really, really cool about trying to get these ideas moving in organizations is once we talk about these in webcasts, once we talk about…

Join us for this week’s Anti-Cast with Jennifer Shannon!
This week’s Anti-Cast is with… Jennifer Shannon!! Join us Wednesday, Sept. 20 at 12 p.m. EDT, for “API-ocalypse Now.” → Register here. As always, join us early, 11:30 a.m. EDT, for a little PreShow Banter™! Get ready for a wild ride as Jennifer Shannon, a Senior Security Consultant at Secure…

How to Use Python to Spy on Your Friends: Web APIs, Recon ng, & OSINT
…secure ideas. We have Kevin Johnson coming. Larry is coming, Paul is coming. M Chris Gates. BB King I can’t even. Sierra I can’t even name them anymore. There’s so many. So. But they’re all on the website. John Strand They are all on our website. Sierra So we’re pretty…

How to Build a Home Lab (with Bill Stearns)
…ask, where do we come up for ideas of webcasts? And a lot of the ideas for webcasts actually pop up out of these existing webcasts that we’re in. So please keep contributing. Keep contributing. so, Bill, do you want to walk us through why anyone would ever want to…

Return on Influence (ROI): Social Engineering for Good
…in our DevOps cycle, we have a dev sec ops cycle where they’re integrated. What about our repositories and the whole CI CD pipeline? Not just is our software going out secure, but is our, infrastructure for managing that, is that secure? Because that might be separate from the infrastructure…
