- Tools How to Set Up a SpiderFoot Server for OSINT Research
SpiderFoot automates OSINT collection from numerous data sources, including Shodan and Have I Been Pwned, to gather intelligence about IPs, domains, and email addresses. Running the free, open source...
- Leadership What's It Like for a New CISO?
Transitioning into a CISO role involves forming an information security program, justifying cybersecurity purchases with business-relevant details, and addressing practical challenges like enabling...
- Communication Top 10 Cybersecurity Writing Mistakes
Common writing mistakes span structure, look, words, tone, and information—the key aspects that work together to capture and hold readers' attention. Avoiding these pitfalls strengthens technical...
- Malware Analysis The State of Malware Analysis: Advice from the Trenches
Practitioners who analyze malware for a living share insights on which approaches work well, how tools and methodologies are evolving, and what career paths exist for analysts. Topics include the...
- Leadership Joining Axonius to Tackle Cybersecurity Asset Management
IT asset management is a foundational security challenge that organizations increasingly struggle to address as modern paradigms like DevOps, IoT, and BYOD complicate tracking systems, devices, VMs,...
- Authentication Cybersecurity Advice for Political Campaigns
Political campaigns face attacks from cybercriminals and nation-state actors who steal credentials, intercept communications, and exploit weak IT configurations. Countermeasures include enabling...