training
Educating the Next Cybersecurity Generation with Tib3rius
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation ...
Building Your Incident Response Team
When the inevitable breach happens, an incident response team is a key asset. Here’s how to build one ...
The Weaponization of AI Demands More Robust Cybersecurity Training
AI has rapidly advanced in recent months. Large language models (LLMs) such as OpenAI’s GPT-4 have made drastic progress, responding fluently and creatively to a vast range of prompts. LLMs have also ...
Learn FAIR Quantitative Analysis for AI Risk in a Virtual Workshop
Artificial intelligence (AI) poses novel and powerful cyber threats both external and internal to your organization – but don’t fall into FUD. With the proven techniques of Factor Analysis of Information Risk ...
The LastPass Attack Gets Worse, What is Gamification, Signal’s Encryption Standoff
Popular password manager LastPass suffered a second attack that lasted for over two months. Now new and disturbing information is being released about the attack. Scott discusses the benefits and challenges of ...
Fortinet Adds Services to Help Close Cybersecurity Skills Gap
Fortinet this week rolled out additional security operations center (SOC) augmentation services and expanded the training programs it provides via the Fortinet Training Institute. Karin Shopen, vice president of cybersecurity solutions and ...
Online Network Forensics Class
I will be teaching two live online network forensics classes this spring, one in March and one in April. The March class is adapted to American time and the April one is ...
Moving Beyond Security Awareness to Security Education
Security awareness training should be part of every organization’s cybersecurity program. Employees can’t prevent risk if they don’t know what risk is. Even the most seasoned cybersecurity professional had to learn that ...
We’re streamers now
Over the years, we’ve built many high-impact tools that we use for security reviews. You might know some of them, like Slither, Echidna, Amarna, Tealer, and test-fuzz. All of our tools are ...
Writing Nonfiction with ADHD
This post is inspired by Tessa Flattum’s post, “How to Write a Novel with ADHD.” I self-diagnosed my own ADHD after my son was diagnosed as a child. I’ve written three technical ...