Zero Trust Networks in a Remote World
What would the “Olympics of Cybersecurity” look like? They just might be the competitions at DEFCON. Samuel Morris writes about some of his favorite events from previous years as well as some of the ones he’s looking forward to this year.
The New Frontier: Securing AI with OWASP’s Cybersecurity Insights
What would the “Olympics of Cybersecurity” look like? They just might be the competitions at DEFCON. Samuel Morris writes about some of his favorite events from previous years as well as some of the ones he’s looking forward to this year.
Preparing for Supply Chain Attacks and Overreliance on Critical Software
Cybersecurity incidents underscore the importance of preparing for and mitigating the risks associated with overreliance on critical software, whether it’s security software like CrowdStrike, operating systems like Windows, or any other widely used software.
The Olympics of Hacking
What would the “Olympics of Cybersecurity” look like? They just might be the competitions at DEFCON. Samuel Morris writes about some of his favorite events from previous years as well as some of the ones he’s looking forward to this year.
dbDump: An iOS Tool
Need a tool to automate dumping .db and .sqlite files from jailbroken iOS devices? Exfil’s got you.
Security Considerations in an Extended Reality (XR) World
Apple Vision Pro is designed to blend digital content and apps into your physical space. Unfortunately, that comes with security risks too.
The Promise of AI in Information Security
Do we blindly depend on AI, expecting it to be a panacea for all security challenges, or do we embrace it with full awareness of its potential and limitations?
Engaging with Your Cybersecurity Team
Exfil Certified offers a modern and dynamic cybersecurity certification, bridging the gap between hacking and securing. Our unique approach emphasizes business acumen, dedicated mentoring, and effective communication to produce the next generation of cybersecurity professionals.
Python’s Role in Cybersecurity
Part of Python’s awesomeness is that it has security features baked-in. Explore these critical libraries for for anomaly detection, malware classification, and behavior analysis.
From Development to Cybersecurity
Moving from being a developer to being a security professional takes a shift in mindset. Read Julian Ramirez’s thoughts on making that change.