At first, the idea of playing a “Robin” in the world of cybersecurity might sound a bit unconventional—after all, who wouldn’t want to be Batman, the caped crusader? But as I’ve discovered, sometimes the sidekick’s role is just as important (and sometimes a bit less dangerous).
In this video, the speaker discusses the intricacies of incident response, highlighting the common pitfalls and emphasizing the importance of preparation. They critique the use of flowcharts in incident response, arguing that they are ineffective and often lead to paralysis when deviations occur.
In this video, John discusses best practices and lessons learned from his extensive experience in penetration testing. He delves into the common pitfalls and mistakes in the cybersecurity industry, offering insights on how to avoid them.
In this video, the speaker discusses the concept of cyber deception and its practical applications in domains. They delve into the effectiveness of commercial cyber deception tools and share insights on creating a deceptive environment with fake user IDs and system names.
In this video, John Strand discusses the innovative techniques for home network defense by leveraging ARP cache poisoning and various security tools. He explains how ARP cache poisoning works and how it can be used to route all traffic through a single device for monitoring and analysis.
In this video, John discuss the intricacies and challenges of threat intelligence feeds. He delves into the effectiveness of these feeds and how they can often be outdated or misused within security frameworks.
In this video, Jon Strand discusses the intricacies of Base64 encoding and decoding. He explains its necessity for transferring binary data over text-based protocols like HTTP and highlights its use in web application security assessments.
In this video, John and Ean discuss techniques and methods used by criminals that can be employed to enhance personal privacy and security. They delve into how these tactics can help individuals protect themselves in a digital age where surveillance and data monitoring are pervasive.
In this video, John Strand discusses the essential Linux commands for initial forensic analysis when suspecting a system compromise. He demonstrates how to use Lsof to identify and investigate open files and network connections, providing insights into process IDs and associated resources.