A Certified Red Team Lead (CRTL) Review
In this post we review the RTO-2 course and CRTL certification offered by Zero-Point Security.
Top 10 international capture the flag competitions
Do you know what capture the flag is in the cybersecurity field? Are you aware of some of the most recent and prominent CTF competitions worldwide? Learn here.
Top 10 offensive security international conferences
Want to know which are the best conferences for hackers? We share our selection of the top 10 international hacking events focusing on offensive security.
Enhancing cybersecurity across government entities
Learn about the Federal Rotational Cyber Workforce Program Act of 2021 and the State and Local Government Cybersecurity Act of 2021, which were signed into law.
Learn with Fluid Attacks about this professional path
Ever wondered what a DevSecOps engineer does in the cybersecurity industry? Find out their job functions and the required skills and experience to become one.
Do you have an incident response plan already?
Organizations need to realize that they are always at risk of suffering cyberattacks and it is of utmost importance that they have a plan for when that happens.
Clues in the investigation of cyberattacks
We describe the kinds of technical traces left in the phases of a cyberattack and talk about how they may help the attribution process.
Employees as the strongest link in the security chain
The human-as-a-security-sensor paradigm asserts that catastrophe can be prevented if employees are trained to report threat events promptly. Learn more here.
Discover social engineers' weapons of influence
Read this post to learn the psychological tactics used in cyberattacks and what personality traits make targets more (or less) susceptible to fall for them.