Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Ransomware Scenario Emulation Report with Illumio
Watch a Special Livestream From DEF CON 30
Leveraging Nuclei for Scalable, Custom Vulnerability Scanning
CISO Stories featuring Will Lin, Founding Team Member at ForgePoint Capital
CyberRisk Alliance Cloud Adoption Security Report
2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management
Tool Talks: Debugging Ruby Exploits
Tool Talk: ripgen
Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business
Combating Ransomware with an Offensive Roadmap
Bishop Fox Secure Code Review Methodology
SC Media Special Event: Continuously Hacking Yourself
Evaluating Offensive Security Solutions: Top 50 Questions to Ask
SW Labs Product Review: Cosmos Attack Surface Management Platform
SW Labs Category Overview: Attack Surface Management (ASM) Solutions
The Wolf in Sheep’s Clothing
Cracking the Code: Secure Code Review in DevSecOps
The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous
What Bad Could Happen? Managing Application Risk with Threat Modeling
A Deep Dive Into Fuzzing
Outpacing the Speed and Precision of Modern Attackers with Continuous Attack Surface Testing
Penetration Testing Resource Guide
How to Build a DevSecOps Program that Works for Developers AND Security
DevSecOps and Application Penetration Testing: Defying the Myth
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.