Harsh VanasiwalaIntegrating AI with OSINT: Ethical Use and Practical ApplicationsAI technologies are perfect for OSINT operations because they can handle large volumes of data quickly and accurately. Here are a few…22h ago
Ryan McGeehaninStarting Up SecurityManaging a quarterly security reviewI like an approach that combines my favorite quarterly review practices I’ve been exposed to. Here’s the general meeting structure:Aug 14
Douglas Giles, PhDinBootcampThe Abject Stupidity of Two-Factor AuthenticationThinking is good. If you think well, then you can solve problems. If you don’t think, then you cause problems. The worst problems are the…Aug 6123Aug 6123
Radheshyam SinghSecuring Mobile Applications: Ensuring Safety from Development to End UserA Comprehensive Guide to Ensuring Robust Security Throughout the Mobile App Lifecycle11h ago11h ago
Tiexin Guoin4th CoffeeContainer Security Scanning: Vulnerabilities, Risks and ToolingContainer vulnerabilities and container security scanning: tools, SCA, runtime security, and more.Jul 262Jul 262
Harsh VanasiwalaIntegrating AI with OSINT: Ethical Use and Practical ApplicationsAI technologies are perfect for OSINT operations because they can handle large volumes of data quickly and accurately. Here are a few…22h ago
Ryan McGeehaninStarting Up SecurityManaging a quarterly security reviewI like an approach that combines my favorite quarterly review practices I’ve been exposed to. Here’s the general meeting structure:Aug 14
Douglas Giles, PhDinBootcampThe Abject Stupidity of Two-Factor AuthenticationThinking is good. If you think well, then you can solve problems. If you don’t think, then you cause problems. The worst problems are the…Aug 6123
Radheshyam SinghSecuring Mobile Applications: Ensuring Safety from Development to End UserA Comprehensive Guide to Ensuring Robust Security Throughout the Mobile App Lifecycle11h ago
Tiexin Guoin4th CoffeeContainer Security Scanning: Vulnerabilities, Risks and ToolingContainer vulnerabilities and container security scanning: tools, SCA, runtime security, and more.Jul 262
Andrew BloomanBuild Your Own Cyber Threat Intelligence System…at Home!Learn how to collect Threat Intelligence for freeAug 28
Hitesh ShettyHow Two-Factor Authentication (2FA) Works: A Deep Dive into Enhanced SecurityUnderstanding Two-Factor Authentication (2FA) and Its Crucial Role in Enhancing Online Security1d ago2
Jan KammerathInside The Outages: A Dangerous Null Pointer Exception Deployed On FridayThe world went into shock when cyber security firm “Crowdstrike”, a provider of endpoint protection software, released an update on Friday…Jul 20116