SECURITY RESOURCES
Offensive minded security exploit development
Threat Modeling
Long Live The Organizational Threat Model! ERAs Are Dead

Red Teaming and Social Engineering
Ransomware Readiness – When Failing is Good

Threat Intelligence
Russia-Ukraine War, Cyberwarfare, and the Impact on Businesses Worldwide

Governance Risk & Compliance
Why Context is King for Your Governance Program

Threat & Vulnerability Management
Age of Misinformation

Application Security, Security Research
Part 6: Comprehensive Research of Linux Operating System

Red Teaming and Social Engineering, VerSprite Security Resources
Penetration Testing Standards – a Viral Topic at RSAC 2022

Application Security
Threats of IoT Devices

Application Security, Security Research
Part 5: Comprehensive Research of Linux Operating System

Application Security, Security Research
Part 4: Comprehensive Research of Linux Operating System

Red Teaming and Social Engineering, Security Awareness
Overview of OSINT and Its Importance for Businesses & Organizations

Application Security, Security Research
Part 3: Comprehensive Research of Linux Operating System

Application Security, Security Research
Part 2: Comprehensive Research of Linux Operating System

Integrated Risk Management (IRM), Reports
Insight Into Critical Threat Report Envisions 2022

Application Security, Security Research
Comprehensive Research of Linux Operating System

Subscribe for Our
Updates
Please enter your email address and receive the latest updates