Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Bishop Fox Social Engineering Methodology
Cybersecurity Style Guide v2.0
Threat Modeling Datasheet
Social Engineering Datasheet
Secure Code Review Datasheet
Ransomware Readiness Datasheet
Product Security Review Datasheet
Incident Response Tabletop Datasheet
Hybrid Application Assessment Datasheet
Cloud Penetration Testing Datasheet
Architecture Security Assessment Solution Brief
Architecture Security Assessment Datasheet
Application Security Portfolio Datasheet
Application Penetration Testing Packages Datasheet
Application Penetration Testing Datasheet
Healthcare Services Datasheet
Financial Services Datasheet
SANS Institute: Inside the Minds & Methods of Modern Adversaries
The Offensive Security Guide to Ransomware Readiness
Ready or Not: A Ransomware Readiness Self-Assessment
An Interview with Marene Allison, Former Global CISO at Johnson & Johnson: From West Point Pioneer to Global CISO
From Fighter Jets to Cyber Defense: How Military Experience Shapes Security Investment
Strategic Insights from Wendy Nather Cisco's Advisory CISO Leader
Disrupting Cybersecurity: A CISO-Investor's Blueprint for Industry Innovation
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.