Search Insights

November 4 / 2024
Reading Time: 4 minutes
Enhancing Vulnerability Management with Incenter Tag Filtering

September 18 / 2024
Reading Time: 7 minutes
Pip Dreams and Security Schemes: Chaos in your Configuration Files

February 19 / 2024
Reading Time: 5 minutes
Purple Teams - The Business Benefits of Cost-Effective Purple Penetration Testing

January 25 / 2024
Reading Time: 4 minutes
Living off the land, an introduction to blending in for red teams

January 15 / 2024
Reading Time: 5 minutes
Indicators of Compromise (IOC): Understanding, Identifying, and Utilizing Cyber Threat Indicators

October 11 / 2023
Reading Time: 6 minutes
What's Up, Doc? An OccamSec approach to the Looney Tunables Bug (CVE-2023-4911)

August 9 / 2023
Reading Time: 4 minutes
Cracked Open: Why Overlooking Lower Risk Vulnerabilities Can Backfire

August 7 / 2023
Reading Time: less than 1 minute
Security Awareness Training is Mostly Pointless: A Practitioner's Perspective

August 7 / 2023
Reading Time: 3 minutes
The Human Touch in Cybersecurity: Why AI Can't Fully Replace Penetration Testers
