Zero Trust Networks in a Remote World

What would the “Olympics of Cybersecurity” look like? They just might be the competitions at DEFCON. Samuel Morris writes about some of his favorite events from previous years as well as some of the ones he’s looking forward to this year.

The Olympics of Hacking

def con 32 logo

What would the “Olympics of Cybersecurity” look like? They just might be the competitions at DEFCON. Samuel Morris writes about some of his favorite events from previous years as well as some of the ones he’s looking forward to this year.

dbDump: An iOS Tool

Screen grab of the dbDump Github page.

Need a tool to automate dumping .db and .sqlite files from jailbroken iOS devices? Exfil’s got you.

Engaging with Your Cybersecurity Team

Hands typing HELP on a laptop that is spitting out smoke, gears, and springs

Exfil Certified offers a modern and dynamic cybersecurity certification, bridging the gap between hacking and securing. Our unique approach emphasizes business acumen, dedicated mentoring, and effective communication to produce the next generation of cybersecurity professionals.

Python’s Role in Cybersecurity

Python code language logo over a screen of Pythone code.

Part of Python’s awesomeness is that it has security features baked-in. Explore these critical libraries for for anomaly detection, malware classification, and behavior analysis.

From Development to Cybersecurity

Time-lapse shot of cars and a divided highway at night.

Moving from being a developer to being a security professional takes a shift in mindset. Read Julian Ramirez’s thoughts on making that change.