Offensive Security
Resources Blog

Offensive Security

Keep up to date with the latest offensive security news, knowledge, and resources.
Ahead of the Breach - Eyal Paz, VP of Research at OX Security
Apr 09, 2025

Ahead of the Breach - Eyal Paz, VP of Research at OX Security

Introducing security into development pipelines is walking a tightrope — one false step can turn developers against your security program.
Ahead of the Breach - Joshua Brown, Founder of Digital Defense Consulting
Mar 25, 2025

Ahead of the Breach - Joshua Brown, Founder of Digital Defense Consulting

Dive deep into why security leaders must abandon technical jargon for financial impact metrics when speaking to executives.
Ahead of the Breach - Donika Mirdita, Security Researcher at Fraunhofer Institute for Secure Information Technology
Mar 12, 2025

Ahead of the Breach - Donika Mirdita, Security Researcher at Fraunhofer Institute for Secure Information Techno...

Explore how fixed query patterns and short manifest lifecycles combine to undermine Internet routing security.
Moving from Snapshots to Strategy: Why CTEM is Essential for Security Leaders
Mar 04, 2025

Moving from Snapshots to Strategy: Why CTEM is Essential for Security Leaders

Discover why Continuous Threat Exposure Management (CTEM) is crucial for security leaders. Learn how moving to real-time threat management can enhance your organization's cybersecurity resilience.
Ahead of the Breach - Kieran Smith, Lead Pentest Engineer, N-able
Jan 07, 2025

Ahead of the Breach - Kieran Smith, Lead Pentest Engineer, N-able

Join Keiran Smith, Lead Pentest Engineer at N-able, as he shares his journey from teenage hacker to security leader, discussing the intersection of development and security testing, and providing insights for aspiring pentesters.
Red Teaming: History, Methodology, and 4 Critical Best Practices
Dec 03, 2024

Red Teaming: History, Methodology, and 4 Critical Best Practices

A “red team” is a group of security experts within an organization, which aims to breach security measures and uncover vulnerabilities, to help the organization improve its defenses.
2 3 4 5 6