Featured Insights
Information security resources to inspire your work.
SANS Institute’s Five Most Dangerous New Attack Techniques
Each year at RSA Conference, SANS provides the authoritative briefing on the most dangerous new attack techniques in use today, what's coming next, and what organizations can do to prepare. This session gives organizations a chance to prioritize upcoming attack vectors and to get ahead of them. Join our CEO and SANS Fellow, Ed Skoudis, for a panel discussion on the latest threats.
OSINT + Offensive Security with Josh Wright
Join Counter Hack Technical Director, Josh Wright, for a panel discussion led by Micah Hoffman, as they explore, understand, and share the applications of Open-Source Intelligence within other disciplines.
Making CTFs count at any point in your story with Ed Skoudis
Expert penetration tester, master challenge developer and SANS Fellow shares the importance of hands-on practice and using CTFs to build skills and creativity.
Think Like a Hacker
How penetration testers exploit security weaknesses in an effort to help companies patch them. Learn about the past, present and future of pen testing, featuring insights from our founder, Ed and other pen test professionals.
How To Get the Most Value Out Of Your Penetration Test
In this RSA Conference webcast, Ed Skoudis shares his expert insights on how to get the most business value from penetration testing.
So You Wanna Be A Pen Tester? 3 Paths To Consider
Ed Skoudis shares three key paths for entering and navigating a career in penetration testing and cybersecurity.
Breaking And Building Your Way To An InfoSec Career
As a successful challenge developer and penetration tester, Chris Elgee shares advice on how to build a career you're passionate about.
Top 10 Reasons It's Great To Be A Pen Tester
With recommendations for pen testers as well as non-pen testers, Ed Skoudis provides practical tips that will ensure you maximize the value of your next pen test.
5 Tips For Getting The Most Bang For Your Pen Test Buck
To really shine in business value, Ed Skoudis recommends asking your pen testers to provide 5 critical items in their engagement reports.
Develop Technical Recall Skills With Anki
Josh Wright examines techniques adapted by the most successful information security analysts to learn and commit new topics to memory for long-term recall — including the amazing Anki tool.
Machine Learning Use Cases for Cybersecurity
In this KringleCon talk, Chris Davis discusses many theoretical use cases for machine learning and neural networks for offensive and defensive security.