A Book Review of “Pentesting Azure Applications” by Matt Burrough

/
In this book review, I looked at the topic of pentesting cloud-based applications, specifically Microsoft’s Azure. While the focus of the book was for Azure, a lot of the information will be beneficial no matter the cloud environment.

A Book Review of “Learning Malware Analysis” by Monnappa KA

/
I found “Learning Malware Analysis” to be very informative, easy to read as well as follow, moreover I found the examples in the book easy to replicate which was priceless.

Cyberwar Season 1 – Episode 3: Cyber Mercenaries

/
Authoritarian regimes are using spyware tools bought from private companies in the West. Hacker PhineasFisher targeted these companies to reveal their deals to suppress dissent.

Book Review of “Practical Cyber Intelligence” by Wilson Bautista Jr

/
Bautista’s approach of the book “Practical Cyber Intelligence” was comprehensive for both the beginner and seasoned security practitioner regardless of their role. I do think seasoned professional in leadership will find more value in the text as compared to a Jr. Security Analyst. In addition, as an educator, this text definitely has a role in the academic realm especially in the graduate level.

Cyberwar Season 1 – Episode 2: The Sony Hack

/
At that time (2014) the Sony Hack was one of the worst attacks against a corporation. Not only were embarrassing emails released, personal health records of employees and their family and social security numbers to name a few were dumped.

Cyberwar Season 1 – Episode 1 Recap: Who is Anonymous?

/
The first episode looked into the decentralized group of international activist hackers known as “Anonymous” which has been linked to numerous high-profile incidents over the years, including Internet attacks on governments, major corporations, financial institutions and religious groups.

The Top 5 Free Network Security Vulnerability Security Scanners

/
A vulnerability scanner is software application that assesses…

The Internet of Things Comes to the DoD–With Disastrous Consequences

/
The Internet of Things Comes to the DoD–With Disastrous Consequences

A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking” by Georgia Weidman (@georgiaweidman)

/
A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking”

Even Thor Couldn’t save “Blackhat”

/
Let’s face it here, the term “Blackhat” is related to hacking but it’s clear they didn’t have anybody on the set that knew what that meant