New from Ponemon Institute: The State of Offensive Security in 2023. Read the Report ›
Combating Ransomware with an Offensive Roadmap
Examine your organization’s level of ransomware preparedness through the lens of offensive security considerations.
SC Media Special Event: Continuously Hacking Yourself
Explore the benefits of continually hacking yourself to discover new assets (including many you don’t even know you have) and their associated vulnerabilities.
Cracking the Code: Secure Code Review in DevSecOps
On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.
The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous
In the hands of skilled attackers, many "low risk" exposures serve as launching pads or steppingstones to more complex and destructive attacks. Join our webcast as we dive into real-world examples.
What Bad Could Happen? Managing Application Risk with Threat Modeling
What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage application security risks.
Tool Talk: Fuzzing
Get the buzz on fuzz testing in software development.
Outpacing the Speed and Precision of Modern Attackers with Continuous Attack Surface Testing
On-demand webcast provides an in-depth look at using Continuous Attack Surface Testing (CAST) to identify and close attack windows before it’s too late.
How to Build a DevSecOps Program that Works for Developers AND Security
On-demand webcast explores how the right DevSecOps strategy empowers both your security and development teams.
DevSecOps and Application Penetration Testing: Defying the Myth
On-demand webcast dives into the role of application penetration testing in today’s software development lifecycle (SDLC).
Tool Talk: Eyeballer
In Episode 1 of our Tool Talk series we explore Eyeballer, an AI-powered, open-source tool designed to help penetration testers assess large-scale external perimeters.
Log4j Vulnerability: A Fireside Chat
Join our panelists as they dive into the attacker’s perspective and how you can identify unusual activity and harden systems against further compromise.
What the Vuln: EDR Bypass with LoLBins
Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.