
STOP using this Two-Factor Authentication (2FA) method!
What is 2FA and are you doing the right stuff to protect yourself?
Read More
Ask an OpenShift Admin: Closed Loop Cloud-Native Security
Red Hat OpenShift has a lot of moving pieces, and sometimes it may seem like too much to remember. Maybe you have a config problem that no amount of search engine kung-fu can solve? Or that you don’t know where to get started with learning and applying these tools to your day-to-day work? That’s where […]
Read More
Top 7 Most Elite Nation State Hackers
Ever wonder what countries have the most advanced hacking capabilities? This video will cover, what is in my opinion, the top 7 biggest cyber powers in the world.
Read More
How to automate your OSINT process with APIs
- Frank
- March 24, 2022
- API
- api security
- api security best practices
- api security testing
- cyber crime
- cyber investigation
- cyber security
- ethical hacking
- hailbytes
- open source intelligence
- OSINT
- osint api
- osint automation
- python automation
- python automation ideas
- python automation projects
- python for hacking
- python for hacking beginners
- python tutorial
- python tutorial for beginners
- ransomware protection
- reconnaissance
- REST API
- Security
- security automation
- security training
This video shows a practical example of how to create a python program to perform OSINT investigations with APIs like Social Scanner.
Read More
Red Hat CEO Paul Cormier: Open Source Drives the Cloud and Edge
Paul Cormier, CEO of Red Hat, discusses how open source’s innovation enables edge, and why hybrid cloud is now the operative model going forward.
Read More
The Science of Inaudible Voice Hacking
- Frank
- February 11, 2022
- Alexa
- Security
Psychoacoustics hiding. Laser hacking. DolphinAttack. Inaudible voice commands. Your virtual assistant is more vulnerable to cyber attacks than you could imagine.
Read More
GitOps With Vault Part 2
This video continues the conversation with Rosemary Wang from HashiCorp on how to use Vault as an encryption service in your GitOps workflow with Argo CD. This is part two of a two-part series on implementing Vault as a secret management system for Kubernetes. If you missed part one, catch up here.
Read More
The Future of Privacy and Security
Robert Sim, Principal Research Manager, Microsoft Research Redmond talks about the future of privacy and security. Security and privacy are key components to building trust in the technologies that we use, whether that be for applications for individuals, businesses, or in government. As new challenges and threats emerge in this area, we need to rely […]
Read More
GitOps With Vault – Part 1
How critical is security in a cloud-native infrastructure? Rosemary Wang from HashiCorp joins us in this episode to discuss using Vault as a secret management system for Kubernetes. This is a big topic, and Rosemary is gracious enough to walk us through every detail of HashiCorp Vault. Are you new to Vault? HashiCorp Vault is […]
Read More
How to Keep an eye on your network – Observium Tutorial
The more I read about events in the security space, the more I feel I need to monitor what’s going on inside my home network. A wise man once said “You can’t know what’s wrong if you never knew what right looks like”. That was me. Keeping a watchful eye on your servers and network […]
Read More