Red Team and Threat-Led Penetration Testing Frameworks
Leveraging frameworks and methodologies for offensive security assessments...
Leveraging frameworks and methodologies for offensive security assessments...
As SCYTHE looks boldly ahead into the new year, the Unicorns welcome the...
In the past week, we learned that both FireEye and SolarWinds were breached....
Setting up Attack Infrastructure is an important task performed by Red...
Episode 2 Show Notes Healthcare is chock full of adventure - rising...
Kerberoasting is a method to steal encrypted Kerberos tickets from valid...
Episode 2 Show Notes Building security in the customer experience,...
Meeting today's security challenges requires the Red Team and the Blue Team...
Episode 1 Show Notes Conversations stimulate ideas, solutions, and...