Safe Browsing with Google Cloud Web Risk A brief guide to Google Safe Browsing, a free URL risk assessment service, and its commercial counterpart, Google Cloud Web Risk.
Getting Started with Google Titan Security Key: A Beginner's Guide A brief introduction to the Google Titan security key, common authentication use cases, and examples for using the key in app authentication.
Getting Started with YubiKey Security Key: A Beginner's Guide A brief introduction to the YubiKey security key, common authentication use cases, and examples for using the key in app authentication.
Passwordless SSH Login with YubiKey Security Key A brief guide to passwordless SSH login with FIDO2-compliant YubiKey hardware security key.
GoDaddy Breach: What You Need to Know GoDaddy breach - what happened, what is the impact, and what you should do next.
LastPass Breach: What You Need to Know LastPass breach - what happened, what is the impact, and what you should do next.
Migrating from HashiCorp Vault to Google Cloud Secret Manager Migrating from a self-hosted HashiCorp Vault to Google Cloud Secret Manager - key considerations, benefits and limitations.
Run Capture-The-Flag Events with CTFd A brief guide to running capture-the-flag style events with the open-source framework, CTFd.
Practice Hacking Skills with OWASP Juice Shop Practice your hacking skills with the OWASP Juice Shop, a modern yet insecure web application.