Cybersecurity Blog & Resources
Arm yourself with the latest security insights and industry intelligence. Our write-ups have the essential knowledge to help you stay secure.
Cybersecurity Blog & Resources
Get the latest security updates and industry intelligence to help you stay secure.
Featured Cybersecurity Blog Posts
How Hurricane Labs went fully remote in less than a day
The title is a bit misleading–years of establishing a healthy remote-friendly work culture is what enabled us to go [...]
How to easily remove an API key from a Git repository
I love learning new things, especially in a tool I’ve used for a long time. In this case, that [...]
R2con 2019 Review
Unix was not designed to stop you from doing stupid things, because that would also stop you from [...]
CPTC Review Part 4: The Data
Over the course of the national competition on November 22-24, we collected more than 9TB of raw data, plus [...]
CPTC Review Part 3: The Process
Something we try to emphasize throughout the competition is the importance of taking care of customer data. After regionals, [...]
CPTC Review Part 2: The Ethics
Understanding the communication and ethics that go along with being a successful pentester is crucial as students enter the [...]
CPTC Review Part 1: The Setup
This competitive event provides an avenue for teaching responsible penetration testing and consulting skills through the creation of a [...]
DEF CON: A first timer’s perspective
Unlike my coworker Tom, I was a complete neophyte to DEF CON - I wasn’t sure what to expect. There’s plenty of [...]
DEFCON 27 & BSidesLV 2019 Takeaways: Part Two
DEFCON Past and Future Comparison The last time I spoke at DEFCON was DEFCON 24, where I presented a talk [...]