Sign Up for our Free One-Day SOC Summit Event March 25, 2026 Register Here

Live Events

SOC Summit Talk: Augmented Detection Engineering

SOC Summit Talk: Augmented Detection Engineering

…detection ideas and tightening logic to evaluating coverage, finding blind spots, and automating documentation. This talk shows practical ways AI can brainstorm attack paths, tighten detections, translate logic, surface logging gaps, and draft documentation, such as playbooks and detection cards, so engineers can focus on precision and strategy. Wade will…

Social Posts

Pages

Privacy Policy Default Image

Privacy Policy

…no method of transmission over the Internet, or method of electronic storage, is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security. Privacy Policies of Other Websites Our Site contains links to other websites, including sites for companies…

Blog Posts

How To Use Threat Intelligence

How To Use Threat Intelligence

This webcast was originally published on April 16, 2018. In this video, John discuss the intricacies and challenges of threat intelligence feeds. He delves into the effectiveness of these feeds and how they can often be outdated or misused within security frameworks. The conversation also explores alternative strategies for utilizing…

5 Year Plan into InfoSec – Part 2

5 Year Plan into InfoSec – Part 2

…So, Randy, I want to throw it over to you because you don’t just have students that have projects, you have team projects that a lot of people are working together. Do you think that that creates a place for people that maybe don’t have any creative, super awesome ideas

How to Use Backdoors & Breaches to do Tabletop Exercises and Learn Cybersecurity

How to Play Backdoors & Breaches

…And I’m like, we could create a card game around this. And that’s really how this all started. And took, took a lot of those ideas from pivots and payloads, cubicles and compromises and rolled it into this game. And the core goal of the game was to try to…

How to Hunt for Jobs like a Hacker

How to Hunt for Jobs like a Hacker w/ Jason Blanchard

…working with the people that I’m working with to solve the problems. Like, I know they’ve got my back and I know that my creative ideas are going to go out there and they’re going to say that one sucks, that one’s okay. So it may not be happy, but…

Realistic End-to-End Attacks & Detective Controls

…and making damn sure that you have kicked out the attacker is hard. one of my favorite resources to get started, is Sean Metcalf’s sneaky, ad tricks to get you started on some of the ideas of how attackers can stay inside of environments. did you add that to answered…

How to Fail at a Pentest

…shut down. And with that in mind, sometimes stepping back, getting away from the keyboard, is where clarity comes. And usually good ideas come from it. So you need that separation. You need that space. You need the room to breathe as a tester. So let’s talk about burnout. I…

BB King is coming to BSides Charm 2023!!

…your web applications secure. Don’t miss out on this incredible opportunity! Register now & join us for this unforgettable experience. Learn more about the course and register at https://www.antisyphontraining.com/bsides-charm-2023/!\! Featured Courses Pay What You Can Pay What You Can Hayden Covington Live Workshop: SOC Detection Engineering Crash Course Apr 10th…

Shopping Cart

No products in the cart.