Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Come WiFind Me: WiFi & Other RF Surveillance
Navigating the IAM Maze: Expert Strategies for Cloud Identity Security
Speaking Board Language: Translating Cybersecurity for Executive Leadership
Intelligence That Matters: Building Cyber Threat Programs That Drive Business Value
Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies
The Human Element: Building Trust and Influence in Security Leadership
Beyond Technical Exploits: The Strategic Value of Red Team Engagements
Managing SaaS Sprawl: Building Security Into Your Multi-Vendor Ecosystem
The Human Side of Security Leadership: Building Teams That Thrive
AI's Dark Potential: Robert Hansen, RSnake and Author of AI's Best Friend, Warns of Superintelligence Risks
Testing LLM Algorithms While AI Tests Us
Behind closed (but vulnerable) doors: How do we get research like Unsaflok?
Bishop Fox RSAC 2024 Livestream
Cyber Resilience: Tactics for Post-Attack Recovery
Mitigate Third-Party Risks by Strengthening Security Foundations
Women in Cybersecurity: Breaking Codes, Breaking Barriers
Pathways in Security: 21 Questions with Attack Surface Analyst Sarah Muriel
Women in Cybersecurity: 21 Questions with Security Consultant Lindsay Von Tish
Beyond Checkbox Compliance: Maximizing Security Value from PCI DSS Penetration Testing
The Zero-Day Arms Race: Why Asset Management Trumps Vulnerability Whack-a-Mole
Exploiting Java Deserialization in GWT: From Detection to Command Execution
Sliver Mastery: Dominating Active Directory Through Advanced Trust Exploitation
What Unpatched Vulnerabilities Reveal: A Red Teamer's Perspective by Trevin Edgeworth, Director of Red Team
Does X Mark a Target? with Trevin Edgeworth, Director of Red Team
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.