Offensive Security
Resources Blog

Offensive Security

Keep up to date with the latest offensive security news, knowledge, and resources.
Ahead of the Breach - Arif Basha, Cybersecurity Leader
Nov 19, 2024

Ahead of the Breach - Arif Basha, Cybersecurity Leader

Ahead of the Breach Podcast sits down with Arif Basha, a cybersecurity leader, as he shares his insights on the critical importance of attack surface management in today’s cybersecurity landscape.
Ahead of the Breach - Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation
Oct 22, 2024

Ahead of the Breach - Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation

Ahead of the Breach Podcast sits down with Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation where he discusses proactive strategies for identifying cybersecurity vulnerabilities.
Penetration Testing in 2024: Why, What, and How
Sep 12, 2024

Penetration Testing in 2024: Why, What, and How

Discover how penetration testing identifies security vulnerabilities to protect systems and data from real-world attacks. Learn the key phases and methods.
Ahead of the Breach - Sprocket Security Pentesters
Sep 11, 2024

Ahead of the Breach - Sprocket Security Pentesters

Ahead of the Breach Podcast sits down with the Sprocket Security Pentesting team to discuss innovative penetration testing techniques.
Recent InfoSec Talks, Defcon 32 - SSHamble: Unexpected Exposures in the Secure Shell
Aug 26, 2024

Recent InfoSec Talks, Defcon 32 - SSHamble: Unexpected Exposures in the Secure Shell

Will Vandevanter discusses a talk he saw at Defcon 2024 that was jam-packed with knowledge, hunting an international criminal, 0 days, and a new open-source tool. Will also talks about some takeaways he got from the talk.
Adopting a Continuous Security Mindset
Aug 21, 2024

Adopting a Continuous Security Mindset

Despite the increase of "continuous" security solutions, the fundamental issues in cybersecurity remain unresolved. The real challenge lies not in the availability of information but in how organizations use it to address systemic problems. By shifting focus from merely fixing individual vulnerabilities to refining operational security processes, companies can build a more effective, continuous security mindset that addresses root causes...
2 3 4 5 6