Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
OSINT Resources and Tools
Explore some of the fundamental domains of OSINT research, plus a list of tools and resources to develop this discipline as a cyber security professional.
Password Cracking For Pentesters: A 5-Step Guide
A look at Heath Adams’ five step methodology for cracking password hashes to quickly establish credentialed access during a penetration test.
Defend Against DoS with Rate Limiting
There are many methods for effectively handling DoS attacks, but as a first step, all web apps should implement rate limiting.
Why Mindset Matters: Unlocking Your Potential
Adopting a productive mindset is important in our personal and professional development. Discover the benefits of embracing a growth mindset.
The Role of Phishing Simulations in Security Awareness Training
Organizations can integrate phishing simulations into their security awareness training to help employees recognize potential phishing attempts.
Teaching Kids Cyber Security Concepts with Bluey
We will take a look at two episodes of the show, Bluey, and how they can be used to explain cybersecurity concepts in a way that kids will understand.
Persevering in a Challenging Cybersecurity Job Market
What is Perseverance? Perseverance: persistence in doing something despite difficulty or delay in achieving success. Ironically, I started writing this blog a couple months ago and initially struggled to get some momentum. No two people reading this are alike, but...
How to Use Social Media for Cybersecurity Networking
I know as you read this, the word “networking” has likely sent your eyeballs rolling. For better or for worse, networking has become a necessity in today’s job market - and cybersecurity is no different. In the last decade of working in cybersecurity, I have found...
Preventing Burnout in the Cybersecurity Field
We can’t defend against cyber threats if we’re dealing with burnout. In this article, we explore the signs and discuss practical strategies to prevent burnout.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








