Webinar: Blockchain Hacking for Investigating Cryptocurrencies on Oct 24 2018

Register Now to Learn Blockchain Hacking Step-by-Step!
Nick Furneaux, forensics trainer, investigator & author of “Investigating Cryptocurrencies” takes you through a journey of code and tools to unpick the movement of illegal funds through the blo… Continue reading Webinar: Blockchain Hacking for Investigating Cryptocurrencies on Oct 24 2018

Container Security Part 3 – Kubernetes Cheat Sheet

During the first two articles of this series, we went from some initial research as a “Quick Dive into Containers, Kubernetes and Security” to a more detailed look at the first steps of actual implementation in “Container Security Par… Continue reading Container Security Part 3 – Kubernetes Cheat Sheet

Ease Me Into Cryptography Part 1: Buzzwords and Hash Function

You know what it’s like being in security, and someone asks you what you do. Now imagine the responses when I tell people I do cryptography. And it’s not just outsiders. Even within a techie crowd, common responses range from “Ooof, t… Continue reading Ease Me Into Cryptography Part 1: Buzzwords and Hash Function

Book Review: Malware Data Science

[caption id="attachment_169289" align="alignright" width="500"] Neural Network Learning Malware vs Benignware[/caption]
“Malware Data Science: Attack Detection and Attribution” (MDS) is a book every information security professional should … Continue reading Book Review: Malware Data Science

Webinar: Basics of IoT Hacking for the Career Pen Tester on Sept 27 2018

Register Now and Learn IoT Hacking Step-by-Step! Independent Security Evaluators (ISE), the people behind the IoT Villages of DEF CON, RSA, DerbyCon and more, will showcase live demos of hacking IoT devices, the methodology for repeatable success and c… Continue reading Webinar: Basics of IoT Hacking for the Career Pen Tester on Sept 27 2018

Container Security Part 2 – Benchmarks to the Rescue

Containers are like BYOD (Bring Your Own Device). They are infiltrating our ranks, and InfoSec professionals’ gut reaction is to hesitate in including them in their environments. But instead of dismissing containers out of hand, I thought it woul… Continue reading Container Security Part 2 – Benchmarks to the Rescue

From Dev to InfoSec Part 1 – The Journey Begins

Hacking is awesome! I can understand the appeal of those that are doing it for a living. The hunt for bugs and the fight to secure systems from bad guys sounds like an incredible challenge of both intellect and skill. It’s probably why I’ve… Continue reading From Dev to InfoSec Part 1 – The Journey Begins

Webinar: The Future of Social Engineering – August 16 2018

Register Now and Learn All Things SE! Noted expert Chris Hadnagy, CEO & Founder of Social-Engineer, LLC, will join us for an hour of exploring the past, present & future of social engineering during a FREE EH-Net Live! webinar on 16th of August… Continue reading Webinar: The Future of Social Engineering – August 16 2018

Book Review: Social Engineering: The Science of Human Hacking

In his new book, “Social Engineering: The Science of Human Hacking, 2nd Edition,” Chris Hadnagy really hits the mark by providing a great overview of social engineering techniques, explaining how and why they work, and giving the reader ple… Continue reading Book Review: Social Engineering: The Science of Human Hacking