
Security Consultants and the Yoo-hoo Chocolate Drink
I’m not going to lie, I love Yoo-hoo drinks, to the point that I have at least one a day and get grumpy if I don’t have one available when
I’m not going to lie, I love Yoo-hoo drinks, to the point that I have at least one a day and get grumpy if I don’t have one available when
Often in security we get so caught up in firewall rules, anti-virus alerts, or answering audit and compliance surveys that we sometimes put the cart before the horse. We focus
I’m an avid hiker and have been a youth leader in several organizations over the past 20 years or so. In outdoor leadership, a core component of leadership is awareness:
A data-security perspective on why casting a ballot by mail is more secure than voting in person, and how the Washington State system has potential to be even stronger 2020
Frida, the code instrumentation toolkit, is excellent software. It gives you the power to observe and tamper with the memory of a running process by hooking functions and changing parameter
Have you heard of the Content Security Policy (CSP) “frame-ancestors” directive? It is a newer alternative to the X-Frame-Options header, which offers better control and broad, but not universal, browser
Metrics are a passion of us at Caliber Security. They provide answers to key questions:• Should we invest more or less in security?• Are we meeting commitments?• Which groups are
Every organization that comes to us for penetration testing is driven by different motives. Our clients come from a variety of industries and range from enterprise level organizations down to
Growing up, I played football and it was all that mattered to me. I thought I could never enjoy another sport as much as I did the game of football.
Today I want to discuss two major tactics in ethical hacking practices: white box and black box hacking. While white box hacking is usually the more popular choice among clients,
I’m not going to lie, I love Yoo-hoo drinks, to the point that I have at least one a day and get grumpy if I don’t have one available when
Often in security we get so caught up in firewall rules, anti-virus alerts, or answering audit and compliance surveys that we sometimes put the cart before the horse. We focus
I’m an avid hiker and have been a youth leader in several organizations over the past 20 years or so. In outdoor leadership, a core component of leadership is awareness:
A data-security perspective on why casting a ballot by mail is more secure than voting in person, and how the Washington State system has potential to be even stronger 2020
Frida, the code instrumentation toolkit, is excellent software. It gives you the power to observe and tamper with the memory of a running process by hooking functions and changing parameter
Have you heard of the Content Security Policy (CSP) “frame-ancestors” directive? It is a newer alternative to the X-Frame-Options header, which offers better control and broad, but not universal, browser
Metrics are a passion of us at Caliber Security. They provide answers to key questions:• Should we invest more or less in security?• Are we meeting commitments?• Which groups are
Every organization that comes to us for penetration testing is driven by different motives. Our clients come from a variety of industries and range from enterprise level organizations down to
Growing up, I played football and it was all that mattered to me. I thought I could never enjoy another sport as much as I did the game of football.
Today I want to discuss two major tactics in ethical hacking practices: white box and black box hacking. While white box hacking is usually the more popular choice among clients,
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.