Defend Like A Girl: Hacking Your Way to Cyber Success
Combatting Adversaries: Proactive Social Engineering & Network Testing
RSA Conference 2023: Leadership Perspectives in Cybersecurity - From CISOs to Founders
Penetrating the Cloud: Uncovering Unknown Vulnerabilities
Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks
Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams
Hacker Insights Revealed: Explore New SANS Survey Results
Bridging the Gap Between Military and Civilian Work
Tool Talk: Unredacter
Vinnie Liu: A Life in the Offensive Security Trenches
Watch a Special Livestream From DEF CON 30
Leveraging Nuclei for Scalable, Custom Vulnerability Scanning
2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management
Tool Talks: Debugging Ruby Exploits
Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business
Combating Ransomware with an Offensive Roadmap
SC Media Special Event: Continuously Hacking Yourself
Cracking the Code: Secure Code Review in DevSecOps
The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous
What Bad Could Happen? Managing Application Risk with Threat Modeling
A Deep Dive Into Fuzzing
Outpacing the Speed and Precision of Modern Attackers with Continuous Attack Surface Testing
How to Build a DevSecOps Program that Works for Developers AND Security
DevSecOps and Application Penetration Testing: Defying the Myth
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.