Why We Game
The infosec community has been gaming for a long time. The first DefCon CTF was hosted in 1996. The iCTF hosted at UC Santa Barbara... Read More
6 Ways to be a Better Pen Tester – Part 2
Penetration testing is a vital component of a Threat Management Solution and is now used widely as an effective method of detecting vulnerabilities in an... Read More
Ethical Hacking: Choosing the Right Pathway!
A) Ethical Hacking IS NOT Pentest We hear it on the internet; ‘XXX certification is better than a C|EH because you have to do an... Read More
Can You Spot the Hacker
Can you spot the hacker? What do you think that means, “hacker?” Were you thinking of a good guy or a bad guy? The term... Read More
6 Ways to Be a Better Pen Tester – Part 1
Penetration testing is a vital component of a Threat Management Solution and is now used widely as an effective method of detecting vulnerabilities in an... Read More
THE ROLE OF CERTIFICATIONS IN YOUR CAREER
A casual letter from me to you about your career in cybersecurity Cybersecurity Education and Certification is, like any other profession, filled with plenty of... Read More