There's not an only way but here's a good one
We offer a guide to become an ethical hacker based off some information on common non-technical and technical skills hackers find useful for their role.
Description and critique of CEH certifications
Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"
An OffSec Experienced Pentester review
In this post, we review the PEN-300 course and OSEP certification offered by OffSec.
Or what makes the ethical hacker
If ethical hackers can do everything cybercriminals do, what is keeping them from wrongdoing? Let's see how they differ and how that shows in codes of ethics.
Recognize the value of this security assessment method
We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.
Differences between these security testing approaches
There is confusion around the differences between breach and attack simulation, penetration testing and red teaming. Read this blog post for a clear comparison.
How BAS solutions work, their importance and benefits
Learn about what breach and attack simulation is, how it works, its role in security testing, and its benefits for defending against advanced threats.
A Certified Red Team Lead (CRTL) Review
In this post we review the RTO-2 course and CRTL certification offered by Zero-Point Security.
Many are waiting to be attacked by criminals to react
After reading this blog post, you will understand what a red team in cybersecurity is, how red teaming works and what benefits it can bring to your company.