The DEFCON Experience : Frat House Converted into DEFCON Simulator A fraternity is helping to pay off their tuition by selling tickets to DEFCON Experience, the world’s first full-sensory conference simulation.
TECHNICAL DNSBL: Not just for spam Security practitioner Menin_TheMiddle is using DNS to stop botnet, spammers and anonymous traffic with Nginx, Lua and DNSBL. Find out how.
Blockchain Startup Completely Solves Security: All Future DEFCONs Cancelled A blockchain startup is making waves at DEFCON this year for having completely solved the problem of information security
TSA Partners with Offensive Security for OSCP Exam Requirements In order to make the OSCP exam a safe and friendly experience, Offensive Security has collaborated with the Travel Security Administration (TSA).
CYBERSEC Got Your Exam Results? Rewards Await You If You Choose To Get Into Cybersecurity Just got your exam results? Rewards await those who take the plunge into cybersecurity. Just ask security writer Matthew Olney who can get you an apprenticeship.
INFOSEC Know Thyself - An InfoSec Commandment "Know thyself" is commonly attributed to conversations about the gods, but in infosec it is particularly relevant to knowing your environment and what is within it.
CYBERSEC Fornite & Android: A Real Battle Royale A warning for those of you with children who like to play Fortnite and other games on your phone, from security writer Stephen Chapendama.
TECHNICAL Featured Bypassing Web Application Firewalls for Cross-Site-Scripting Web Application Firewalls can make your life much harder when using automated tools. But you can bypass a lot of firewalls when exploiting XSS vulnerabilities by analyzing them manually.
CYBERSEC India - A Hackers Perspective Lets take a closer look at India and what normal people there think about hackers, with security researcher Rohan Chavan.
CYBERSEC The Six Lessons That I Learned Landing My First Cybersecurity Job Learn how Janice Dyer managed to land her first job in cybersecurity and the six valuable lessons that she learned along the way.
TECHNICAL Writing A Simple Directory Bruteforcing Tool with 25 Lines of Python Security researcher Rohan Chavan got bored one day and wrote a simple directory brute force tool using just 25 lines of Python.
CYBERSEC My First Swag Pack : A Logical Bug on Edmodo A very short story about the first swag pack that security researcher Abartan Dhakal ever won, when he found a logical bug at Edmodo.
The Semi-Attached Figure: How To Spot Manipulative Security Advertising Claims Marketing claims and proof for the claim are often unrelated. Don’t fall for it! A guide to manipulative security advertising with Tony Martin-Vegue.
CYBERSEC Rise Of The HTTPS Bullies It all started with Google unilaterally deciding to call most of the internet UNSAFE because they did not have an SSL certificate installed, this is what led to the rise of the HTTPS bullies.
INFOSEC My Journey To The OSCP Exam The journey to completing the OSCP exam can be a long one, learn about the trials and tribulations of security analyst Lee Wangenheim as he prepared to take his OSCP exam.
CYBERSEC Tips From A Bugbounty Hunter Some great success tips in this short beginners guide to bug hunting, from infosec researcher Abartan Dhakal
INFOSEC Developing a Leadership Team that Embraces Cybersecurity Awareness Learn how to develop a leadership team which embraces cybersecurity awareness with infosec CEO Jon Santavy.
CYBERSEC Why Has Remote Browser Isolation Not Been More Widely Adopted? Remote browser isolation is clearly the future of endpoint cybersecurity, but why has the model not been more widely adopted?
CYBERSEC How I Stole Your Username & Password In Five Minutes Using WiFiPhisher. Security researcher Riccardo Landolfo explains how easy it is for a hacker to phish your usernames and passwords over a public WIFI network.
CYBERSEC Why You Should Include Cyber Requirements In The Development Cycle Including cyber requirements in your dev cycle can pay dividends over the long term argues security writer Miguel Calles.
INFOSEC The Mad Men of Security Advertising Learn how the framing effect is used to subtly change reader perceptions in security advertising, with security strategist Tony Martin-Vegue.
INFOSEC Asset Discovery In A Complex Enterprise Maintaining an inventory of assets is a challenge. This article looks at ways to identify the full breadth of your organizations internet-facing estate.
CYBERSEC Cloudy With A Chance Of Downfall - A Look At Cloud Access Security Brokers Cloud based applications bring with them a number of new risks. Is your security strategy taking them into account?
INFOSEC Red Notice Blizzard Warning: Secure Communications & Willful Ignorance Sitting in front of a criminal or extremist and explaining the benefits of risk mitigation is not wise if your best defense is that encryption is a human right.
CYBERSEC Featured Create a Digital Fortress With a Private Search Engine and a VPN Learn how to create a 'digital fortress' to maintain your online privacy using a search engine and a VPN with security researcher Christian Stewart.