OWASP TOP 10 w/ Kevin Johnson
Since 2003, OWASP has released the Top 10 Most Critical Web Application Security Risks list. It has been the basis of much development and consternation, but do you really understand […]
Since 2003, OWASP has released the Top 10 Most Critical Web Application Security Risks list. It has been the basis of much development and consternation, but do you really understand […]
Thursday, August 25, 2022 – 1 pm (UTC -4) Register: https://zoom.us/webinar/register/WN_Nwx4p22dT_-SuGekLdjExQ Cyber Deception is a strategy used to attract cyber criminals away from an enterprise’s true assets and divert them […]
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The […]
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The […]
Ever wondered how purple teaming can supercharge your cyber capability? In this 16-hour, hands-on course, attendees will learn the balance between threat understanding and detection understanding to run their own […]
https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/
Hi friends! The Black Hills Team is in town for BSides Atlanta on Saturday, August 27th, and we would love to catch up with you the Friday before! If you'd […]
Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. […]
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and […]
Register: https://www.antisyphontraining.com/enterprise-security-for-all-w-bob-hewitt-rich-fifarek/ This 16-hour Information Security training class is targeted for newly appointed or dual-roled (your primary job + security) security professionals within a Small or Medium Business (SMB) or […]
In this class, Kip shows InfoSec supervisors how to build the team of their dreams. Students will learn how to attract and retain top tier talent. The kind of talented […]