Migrating from HashiCorp Vault to Google Cloud Secret Manager Migrating from a self-hosted HashiCorp Vault to Google Cloud Secret Manager - key considerations, benefits and limitations.
Run Capture-The-Flag Events with CTFd A brief guide to running capture-the-flag style events with the open-source framework, CTFd.
Practice Hacking Skills with OWASP Juice Shop Practice your hacking skills with the OWASP Juice Shop, a modern yet insecure web application.
Sun Tzu and the Art of (Cyber) War Sun Tzu and the Art of (Cyber) War - applying 5 simple but effective principles to cybersecurity and cyber warfare.
Phishing Attack Simulation with Gophish A step-by-step guide to phishing attack simulation and employee awareness using Gophish.
Domain Registrars: GoDaddy vs Namecheap vs Cloudflare vs Google Which domain registrar should you use in 2026? We compare pricing, privacy, security and features across GoDaddy, Namecheap, Cloudflare and Google.
Immutable Transparency Logs with Sigstore Rekor A step-by-step guide on creating an immutable ledger and storing transparency logs with Sigstore Rekor.
Sign Software Artifacts with Sigstore Cosign A step-by-step guide on signing code and software artifacts with Sigstore Cosign.
The Muggles Guide to Software Supply Chain Security The muggles guide to software supply chain security, a short compendium.
Discover Intrusions with Canarytokens A brief on discovering intrusions in your network and systems using canarytokens.