Oct 13, 2020
How to Keep Your Organization Safe From Social Engineering
By Daniel Wood
Oct 06, 2020
Defining the Scope of Your Pen Test
By Jake Miller
Sep 30, 2020
When Automation Isn’t Enough: The True Impact of Human Expertise on Your Perimeter
By Ori Zigindere
Sep 28, 2020
Design Considerations for Secure GraphQL APIs
By Jake Miller
Sep 22, 2020
More Important Than a TPS Report: Designing a Realistic CTF for DEF CON Safe Mode
By Barrett Darnell
Sep 15, 2020
Design Considerations for Secure Cloud Deployment
By Jake Miller
Sep 08, 2020
h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)
By Jake Miller
Sep 03, 2020
Music to Hack To: A Bishop Fox Mixtape
By Britt Kemp
Aug 27, 2020
Zamzar API Advisory
By Chris Flanagan
Aug 25, 2020
What Makes a Good Penetration Test?
By Jake Miller
Aug 19, 2020
20 Tips on How to Make the Most of Your Pen Test
By Jake Miller
Aug 18, 2020
8 Recommended Talks From DEF CON 28
By Britt Kemp
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.