Hardware Hacking 101 – Lesson 2: Classical Hardware Hacking

Welcome back to our ongoing series on hardware hacking and our second lesson. Last month we presented “Lesson 1: Beauty, Your Home Lab and Basic Electronics” with an appreciative nod to this fine art, the essential components needed to try … Continue reading Hardware Hacking 101 – Lesson 2: Classical Hardware Hacking

Video: From Dev to InfoSec: #MyInfoSecStory

A Roadmap to a Cyber Security Career!
Video and Slide Deck from EH-Net Live! Feb 2019
It’s pretty clear that the skills gap in the InfoSec industry is a real thing with estimates in the millions of the number of jobs that go unfilled because of a… Continue reading Video: From Dev to InfoSec: #MyInfoSecStory

Book Review – Linux Basics for Hackers

With countless job openings and growth with no end in sight, InfoSec is the place to be. Many pose the question, “Where do I start?” Over his years of training hackers and eventual security experts across a wide array of industries and occu… Continue reading Book Review – Linux Basics for Hackers

Video: A Perfect Crime: The Tech and Psych of Effective Phishing

See the Attack They Can’t Refuse!
Video and Slide Deck from EH-Net Live! Jan 2019
The InfoSec industry has done a pretty good job over the last couple of decades in protecting internal corporate infrastructure and the endpoints that made up the traditi… Continue reading Video: A Perfect Crime: The Tech and Psych of Effective Phishing

Webinar: From Dev to InfoSec: #MyInfoSecStory on Feb 21, 2019

Register Now for a Roadmap to a Cyber Security Career!
Rey Bango of Microsoft offers an introspective look at the decision to change careers, what it took to get there, maintaining a work-life balance and the highs and lows on the road less traveled. J… Continue reading Webinar: From Dev to InfoSec: #MyInfoSecStory on Feb 21, 2019

Ease Me Into Cryptography Part 3: Asymmetric Ciphers

Welcome to Part 3! A quick recap of where we’ve been. In Part 1: Buzzwords and Hash Function we talked about some foundational cryptography vocab and were introduced to hash functions, how they’re used, and some drawbacks. In Part 2: Symmet… Continue reading Ease Me Into Cryptography Part 3: Asymmetric Ciphers

Hardware Hacking 101 – Lesson 1: Beauty, Your Home Lab and Basic Electronics

Hardware hacking is one of those subjects that a lot of hackers appear to have great interest, but most don’t act on that interest. There are a variety of reasons why this may be such as a perceived steep learning curve, financial barrier to entry, and… Continue reading Hardware Hacking 101 – Lesson 1: Beauty, Your Home Lab and Basic Electronics

Webinar: A Perfect Crime: The Tech and Psych of Effective Phishing on Jan 31, 2019

Register Now for an Offer You Can’t Refuse!
Join Erich Kron of KnowBe4 for a technical foundation of phishing with tools such as Modlishka and SET and how to drastically ramp up their effectiveness with proven techniques of hacking the human brai… Continue reading Webinar: A Perfect Crime: The Tech and Psych of Effective Phishing on Jan 31, 2019

Cyber Security FUD – Fear and the Growth of the InfoSec Industry

How many times have you read marketing propaganda for information security products that includes slogans that sound like the following?

“Find out what’s lurking inside your system.”[1]
“With network security, if you’re n… Continue reading Cyber Security FUD – Fear and the Growth of the InfoSec Industry

Video: Learning AI for Hackers – A Visual Primer

Watch Now for a Career Foundation in Data Science!
Video and Slide Deck from EH-Net Live! Dec 2018
Last month on EH-Net Live! we discussed a lot of big picture concepts on the growing AI presence in organizations, and, more specifically for our ethical… Continue reading Video: Learning AI for Hackers – A Visual Primer