Sign Up for our Free One-Day SOC Summit Event March 25, 2026 Register Here

Social Posts

Pages

Terms of Service Default Image

Terms of Service

…claims, concerns, or questions regarding third-party products should be directed to the third party. SECTION 9 – USER COMMENTS, FEEDBACK AND OTHER SUBMISSIONS If, at our request, you send certain specific submissions (for example contest entries) or without a request from us you send creative ideas, suggestions, proposals, plans, or…

Blog Posts

OPSEC Fundamentals for Remote Red Teams

This webcast was originally published on March 23, 2021 In this video, Michael Allen discusses operational security fundamentals for remote red teams. He delves into the importance of maintaining secrecy in red team operations and the potential risks of exposure. Allen provides practical insights on how to effectively secure red…

AI in InfoSec? Well, Let’s Talk About It

…summary. The speaker discusses techniques, challenges and tools and open source intelligence, OSN and related fields emphasizing critical thinking, private privacy biases involving digital landscapes. That sounds really interesting. I should probably read that or watch that talk goes into the overall ideas and then gives me some insights quotes,…

The Realities of SOC Work

The Realities of SOC Work

…also taking advantage of AI and automation in your various SOCs. And I have. I’ve been hearing this a lot. Daniel Lowrie A lot of people asking this question. How can we integrate AI? Is it secure? Can we do that securely? Will it be seamless? There’s, like, a lot…

Getting Started in Blockchain Security and Smart Contract Auditing

Blockchain Security and Smart Contract Auditing

…of other issues that are still being found all the time. These are just some kind of. Just to throw at you today, just to show you, hey, here’s some of the things that are happening. And, here’s some of the issues. With that being said, functions that appear secure

Getting Started with Burp Suite & Webapp Pentesting

…have a class called modern web app pen testing, and we use burp in that class. We just had the last run. We did that with the, secure west Virginia last week, and we’re looking to get it up and running again sometime in the first quarter of next year….

Getting Started in Cyber Deception

…can run it on prem, you can run it off prem, it’s really up to you, but you’re going to want to go through and secure it. If you look in ADHD, there’s actually a, log in real quick. You have credentials and ADHD lists out all the default credentials…

Privacy Tips for the Non-Criminal – Part 1

…you’re like, oh, I would really like to figure out how I can get less data on the Internet. Here’s where you go. You check these books out last. We’re not going to go into detailed concepts of how to secure your devices. We might touch on some of it,…

Intro to Network Security Monitoring (NSM)

…we, we haven’t even announced this yet. We’re still getting a couple things together. But one thing is live for this, In December, on December 4th, we are doing a Secure Code Summit. So I just put a link in the chat for Zoom. So if you guys are interested,…

Shopping Cart

No products in the cart.