Building the Next Generation of Cybersecurity Consultants: An Interview with Manny Mand
What does it take to grow the next generation of cybersecurity consultants? Manny Mand discusses his cybersecurity journey and role at Hackers for Change.
Secure Your Software Build Operations
What secures (or fails to secure) your business does not depend on written policies. It depends on what your development team is doing day in and day out.
TimeGap Theory: Testing for TOCTOU Issues in Web Applications
Your security and development teams should know how to identify and mitigate TOCTOU vulnerabilities. Learn why, and learn how, to test for them in this new book.
How to Build Custom Red Team Testing Tools in C++
A conversation with Steven Patterson about his eBook, which teaches red team testing professionals how to start building Command and Control tools in C++.
What to Look for in a Penetration Testing Provider
Ask these five questions to find a penetration testing provider that both satisfies your technical needs and works in harmony with your business.
Cybersecurity Awareness Month: 10 Tips for Better IoT Security
This Cybersecurity Awareness Month, take time to consider all the devices you have online. These 10 tips will help you create or strengthen your IoT security plan.