When we wanted to have Martin Fisher on, it was to discuss ‘Security Mandate vs. Security Influence’. We wanted to discuss why companies treat compliance as more important, and if it’s only because business requires it to be done. And if infosec is a red-headed stepchild because
Read more →Get even more convenient access to Cybrary through our Android mobile app so you can learn how to hack, crack and exploit nearly anything. Our developer @akhaliq92 has worked diligently over the past several months to make your mobile experience better with features that include easy video
Read more →WMI (Windows Management Instrumentation) has been a part of the Windows Operating system since Windows 95. With it, you can make queries about information on hosts, locally and even remotely. Why are we talking about it? Its use in the enterprise and by admins is rarely used,
Read more →That’s the question many think is an automatic ‘yes’. Whether your httpd is running on port 82, or maybe your fancy #wordpress #module needs some cover because the code quality is just a little lower than where it should be, and you need to cover up some
Read more →We’ve realized that it might have been confusing for some people on where to start a class since all of the “good stuff” was buried under hundreds of page scrolls. Well now we’ve re-arranged the main course pages. The information you wanted is now on top (go
Read more →I got a hold of Mr. Wim Remes, because he was elected to the ISC board in November 2015. Recent changes to the CISSP included changing the long-standing 10 domains down to 8 domains, plus a major revamp to all of them. I wanted to know what
Read more →Dave Kennedy does a lot for the infosec community. As owner/operator of 2 companies (Binary Defense Systems and Trusted Security), he also is an organizer of #DerbyCon as well as creator and active contributor to the Social Engineering ToolKit (#SET). You can also find him discussing the
Read more →This week, we find ourselves understanding the #Cryptonite that can weaken devs and software creators when dealing with #cryptographic #algorithms and #passwords. Lack of proper crypto controls and hardcoded passwords can quickly turn your app into crap. Remember the last time you heard about a hardcoded #SSH
Read more →Anti-virus products… they have been around for as long as many of us have been alive. The first anti-virus program, “The Reaper” was designed to get rid of the first virus ‘The Creeper’ by Ray Tomlinson in 1971. This week, we discuss the efficacy of anti-virus. Is
Read more →