Getting Started with Google Titan Security Key: A Beginner's Guide A brief introduction to the Google Titan security key, common authentication use cases, and examples for using the key in app authentication.
Getting Started with YubiKey Security Key: A Beginner's Guide A brief introduction to the YubiKey security key, common authentication use cases, and examples for using the key in app authentication.
Passwordless SSH Login with YubiKey Security Key A brief guide to passwordless SSH login with FIDO2-compliant YubiKey hardware security key.
GoDaddy Breach: What You Need to Know GoDaddy breach - what happened, what is the impact, and what you should do next.
LastPass Breach: What You Need to Know LastPass breach - what happened, what is the impact, and what you should do next.
Migrating from HashiCorp Vault to Google Cloud Secret Manager Migrating from a self-hosted HashiCorp Vault to Google Cloud Secret Manager - key considerations, benefits and limitations.
Run Capture-The-Flag Events with CTFd A brief guide to running capture-the-flag style events with the open-source framework, CTFd.
Practice Hacking Skills with OWASP Juice Shop Practice your hacking skills with the OWASP Juice Shop, a modern yet insecure web application.
Sun Tzu and the Art of (Cyber) War Sun Tzu and the Art of (Cyber) War - applying 5 simple but effective principles to cybersecurity and cyber warfare.
Phishing Attack Simulation with Gophish A step-by-step guide to phishing attack simulation and employee awareness using Gophish.