Joshua Arsenio

  • Building the Next Generation of Cybersecurity Consultants: An Interview with Manny Mand

    Building the Next Generation of Cybersecurity Consultants: An Interview with Manny Mand

    What does it take to grow the next generation of cybersecurity consultants? Manny Mand discusses his cybersecurity journey and role at Hackers for Change.

    Read Article
  • Secure Your Software Build Operations

    Secure Your Software Build Operations

    What secures (or fails to secure) your business does not depend on written policies. It depends on what your development team is doing day in and day out.

    Read Article
  • TimeGap Theory: Testing for TOCTOU Issues in Web Applications

    TimeGap Theory: Testing for TOCTOU Issues in Web Applications

    Your security and development teams should know how to identify and mitigate TOCTOU vulnerabilities. Learn why, and learn how, to test for them in this new book.

    Read Article
  • How to Build Custom Red Team Testing Tools in C++

    How to Build Custom Red Team Testing Tools in C++

    A conversation with Steven Patterson about his eBook, which teaches red team testing professionals how to start building Command and Control tools in C++.

    Read Article
  •  What to Look for in a Penetration Testing Provider

    What to Look for in a Penetration Testing Provider

    Ask these five questions to find a penetration testing provider that both satisfies your technical needs and works in harmony with your business.

    Read Article
  • Cybersecurity Awareness Month: 10 Tips for Better IoT Security

    Cybersecurity Awareness Month: 10 Tips for Better IoT Security

    This Cybersecurity Awareness Month, take time to consider all the devices you have online. These 10 tips will help you create or strengthen your IoT security plan.

    Read Article
  • loading
    Loading More...