Cybersecurity

Security Awareness Training Scenarios, Part 3: USB Drives in Public Areas

Almost a classic in the field of IT security awareness training is handing out USB drives in a parking lot outside a company.

What Are Red Teaming and Purple Teaming in Cybersecurity?

Discover how red teaming and purple teaming can strengthen your cybersecurity defenses by simulating real-world attacks and fostering collaboration...

What Is the MITRE ATT&CK Framework?

The MITRE ATT&CK framework is a scientifically based, publicly accessible knowledge model that systematically documents the behaviors and methods of...

Security Awareness Training Scenarios, Part 2: Hardware Scavenger Hunt

A hardware scavenger hunt turns security awareness training into an interactive exercise in which participants search the building for hidden devices...

What Are the 4 Principles of Cryptography?

The main purpose of cryptography is to meet one or more of these security principles: confidentiality, integrity, authenticity, and nonrepudiation.

Implementing VPNs Using IPS

Want to keep your data safe? Here’s how VPNs and IPsec have your back!

A Primer on Asymmetric Cryptography

Cryptography is categorized based on the symmetry of the encryption key and encryption-decryption algorithms.

Security Awareness Training Scenarios, Part 1: Contaminated Workplace

Security awareness training is most effective when participants can experience threats in a realistic, hands-on environment.

Securing SSH Access with YubiKey: A Step-by-Step Guide to Two-Factor Authentication

Learn about enhancing your SSH login security with YubiKey, a robust two-factor authentication method using a USB security token for one-time...

11 Linux Shell Commands for Hacking and Security

The Linux command line is where visibility, control, and power meet — and nowhere is that more true than in security work.