Sun Tzu and the Art of (Cyber) War Sun Tzu and the Art of (Cyber) War - applying 5 simple but effective principles to cybersecurity and cyber warfare.
Phishing Attack Simulation with Gophish A step-by-step guide to phishing attack simulation and employee awareness using Gophish.
Domain Registrars: GoDaddy vs Namecheap vs Cloudflare vs Google A brief comparison of popular domain registrars - GoDaddy, Namecheap, Cloudflare and Google.
Immutable Transparency Logs with Sigstore Rekor A step-by-step guide on creating an immutable ledger and storing transparency logs with Sigstore Rekor.
Sign Software Artifacts with Sigstore Cosign A step-by-step guide on signing code and software artifacts with Sigstore Cosign.
The Muggles Guide to Software Supply Chain Security The muggles guide to software supply chain security, a short compendium.
Discover Intrusions with Canarytokens A brief on discovering intrusions in your network and systems using canarytokens.
What are Canary Tokens? A brief on canary tokens, an easy way to discover network and system intrusions.
Generate SBOMs for Container Images using Syft A brief on generating SBOMs (software bill of materials) for container images using Syft.
What is SBOM? A brief on software bill of materials, or SBOM, and why it is important to software supply chain security.