- Career How to Strengthen Your IT or Cybersecurity Resume
Make your resume stand out by answering "So what?" for every experience. Don't just list tasks—explain accomplishments. Instead of "managed corporate firewall," write "managed corporate firewall,...
- Cheat Sheets Analyzing Malicious Documents Cheat Sheet
Analyzing malicious documents involves examining files for anomalies, locating embedded code like macros or JavaScript, extracting and deobfuscating suspicious content, and emulating shellcode. Key...
- Tools Breaking Down the Walls Between Application and Infrastructure Security
Application and infrastructure security often reside in separate teams with different skill sets, leading to gaps. Unify responsibilities under common leadership, include both in penetration tests,...
- Tools Tips for Converting Shellcode to x86 Assembly
Two tools help analysts convert shellcode found in exploits or malicious documents into readable x86 assembly: ConvertShellcode.exe disassembles shellcode strings immediately, while shellcode2exe.py...
- Training Introduction to Malware Analysis - Free Recorded Webcast
- Tools More Than a Hammer: Expanding the Information Security Toolbox
Security programs over-focus on networks and systems because infrastructure is most practitioners' background. The toolbox needs domain expertise in business functions, data analytics for measuring...