Migrating from HashiCorp Vault to Google Cloud Secret Manager Migrating from a self-hosted HashiCorp Vault to Google Cloud Secret Manager - key considerations, benefits and limitations.
Run Capture-The-Flag Events with CTFd A brief guide to running capture-the-flag style events with the open-source framework, CTFd.
Practice Hacking Skills with OWASP Juice Shop Practice your hacking skills with the OWASP Juice Shop, a modern yet insecure web application.
Sun Tzu and the Art of (Cyber) War Sun Tzu and the Art of (Cyber) War - applying 5 simple but effective principles to cybersecurity and cyber warfare.
Phishing Attack Simulation with Gophish A step-by-step guide to phishing attack simulation and employee awareness using Gophish.
Domain Registrars: GoDaddy vs Namecheap vs Cloudflare vs Google A brief comparison of popular domain registrars - GoDaddy, Namecheap, Cloudflare and Google.
Immutable Transparency Logs with Sigstore Rekor A step-by-step guide on creating an immutable ledger and storing transparency logs with Sigstore Rekor.
Sign Software Artifacts with Sigstore Cosign A step-by-step guide on signing code and software artifacts with Sigstore Cosign.
The Muggles Guide to Software Supply Chain Security The muggles guide to software supply chain security, a short compendium.
Discover Intrusions with Canarytokens A brief on discovering intrusions in your network and systems using canarytokens.