This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
If you’re new to the information security field, or are looking to take your first steps towards a new career in InfoSec, the KLCP is a “must have” foundational certification. New Book - Kali Linux Revealed Mastering the PenetrationTesting Distribution More exciting news!
Book launch: The Privacy Leader Compass On Wednesday January 17th, join us for the launch of “The Privacy Leader Compass”, a groundbreaking book by BH Consulting COO Dr. Valerie Lyons, and Todd Fitzgerald, CISO, cybersecurity and privacy leadership author. Book your place at the link below. Here’s what the data tells us.
I’d like to diverge from our typical blog topics today to discuss the Offensive Security Certified Professional (OSCP) certification, and more importantly the associated course PenetrationTesting with Kali (PWK) provided by Offensive Security. I already worked in infosec, and had a strong interest in the offensive security side.
In a few minutes I’m going to talk to a pentester who’s written a book that can help take your current skills as a sys admin and security engineer and turn them into skills needed to become a great digital pentester. She is an impressive force within the infosec world. available wherever books are sold.
In a few minutes I’m going to talk to a pentester who’s written a book that can help take your current skills as a sys admin and security engineer and turn them into skills needed to become a great digital pentester. She is an impressive force within the infosec world. available wherever books are sold.
Twitter infosec is the top 10%, at best, arguing with each other. I had a crazy idea this morning that I don't actually believe, but thought would be a great book idea. And therefore knowing how your stimuli will affect outcomes. What do you think the stat is for those without CIOs? Probably also zero. Don’t want to patch?
In this exciting episode of our podcast we have the pleasure of speaking with Phillip Wylie, a remarkable professional with a captivating career in cybersecurity. Join us as we discuss Phillip’s unique journey and uncover valuable insights on breaking into the cybersecurity field.
GCPwn’s ease of use cannot be understated: it’s perfect for both someone new to cloud security and pentesting but also powerful enough to help even seasoned cloud pentesters quickly conduct high-value penetrationtests. Don’t be afraid of sending large (4gig +) payloads for clear/white/open box testing.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. For many, though, that isn’t true. It appears that skills alone aren't enough to get everybody through the door.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. For many, though, that isn’t true. It appears that skills alone aren't enough to get everybody through the door.
His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Bruce Schneier | @schneierblog.
Yet, although I didn't need another one, I looked at it just as we were getting ready to do a big penetrationtest of the US House of Representatives’ network. First, I bought study books, and I just read them cover to cover. I did not need another credential because I already had at least six others. I did two things.
So basically, we deliver custom penetrationtests. And that's just because it's not in the books VAMOSI: True. A lot of infosec’s knowledge is either tribal -- passed on from one person to another - or can be found in books. We do forensics incident response, but also in general cybersecurity consulting.
Kim Zetter’s book, Countdown to Zero Day, is perhaps the definitive book on the subject. We get the InfoSec people that were on enterprise systems, we get them that come because they want to learn more about security. Historically with InfoSec it's been Hey, the sky is falling. Test, do that, you know, Purple team.
Should infosec now be considered vocational training just like becoming an electrician or a plumber? How else should we address the skills gap in infosec? My boss at the time didn't know much about infosec. She died a few years ago, but I believe the book continues with other authors. I was a paid writer--whoo, whoo.
No, I simply bought Shon Harris’s massive book CISSP- All-in-One Exam Guide -- and read through it -- not one, twice. Then I took the test and hoped for the best. I joined a Discord server called InfoSec prep. So originally, it was sold as sort of an entry level penetrationtesting exam. I’m waiting.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content