Understanding the OWASP Top 10 Web Application Risks

The OWASP Top 10 Web Application Security Risks has become synonymous with web application security. Learn who OWASP is and where the top 10 list began and the other resources OWASP has to offer.
The post Understanding the OWASP Top 10 Web Application… Continue reading Understanding the OWASP Top 10 Web Application Risks

Getting IAST Results from DAST Testing

IAST is one of the latest buzzwords in security testing, and now required as part of the NIST SP800-53 Revision 5 security framework. Learn how to get IAST results using your existing DAST testing.
The post Getting IAST Results from DAST Testing appea… Continue reading Getting IAST Results from DAST Testing

Hottest 11 Cybersecurity Certifications

If you’re not busy during this pandemic and have been wondering how you can brush up on your resume to enhance your cybersecurity credentials, CRN has just the thing for you.  CRN published their list of the 11 hottest Cybersecurity Certifications for … Continue reading Hottest 11 Cybersecurity Certifications

Microsoft Delays Retirement of MCSE, MCSA, and MCSD Certifications


A few weeks ago, Microsoft made a significant announcement regarding several of its popular certifications. The company announced that Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Developer (MCSD), Microsoft Certified Solutions Expert (MCSE) certifications would be retired on June 30, 2020.

The post Microsoft Delays Retirement of MCSE, MCSA, and MCSD Certifications appeared first on Petri.

Continue reading Microsoft Delays Retirement of MCSE, MCSA, and MCSD Certifications

New SHA-1 Attack

There’s a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the co… Continue reading New SHA-1 Attack

New SHA-1 Attack

There’s a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the complexity of collisions attack against SHA-1: on an Nvidia GTX 970, identical-prefix collisions can now be computed with a complexity of 261.2rather than264.7,… Continue reading New SHA-1 Attack

Top 10 Podcast Episodes from 2019

Thank you for supporting and listening to the show this year! Initial data on our download numbers show that we’ve grown our audience by over 40% in 2019! Having said that, if you haven’t listened to our most popular episodes you should def… Continue reading Top 10 Podcast Episodes from 2019

The Top Cyber Security Certifications Hiring Managers Will Look For in 2020

Here’s what to know about the best cyber security certifications and how they’ll benefit your career As a cyber security professional, you’ve likely found yourself pondering the benefits of cyber…
The post The Top Cyber Security Ce… Continue reading The Top Cyber Security Certifications Hiring Managers Will Look For in 2020

Cybersecurity Career Path: A Beginner’s Guide

The time is now to start a cybersecurity career, as the need is more urgent than ever Cyberattacks happen every day to all types of businesses and organizations. That’s why keeping hardware, software and digital information secure is more crucial than… Continue reading Cybersecurity Career Path: A Beginner’s Guide

Think Outside the Box to Close the Skills Gap

The skills gap in cybersecurity is a topic I address a lot, but it is also one of the issues in cybersecurity for which we just can’t figure out the solution. It is a topic that has been front and center of almost every cybersecurity conference I’ve a… Continue reading Think Outside the Box to Close the Skills Gap