Are you tired of spinning up an entire OS in a VM just to run a tool? Have you ever struggled to install a program you needed? When was the last time you spent hours troubleshooting a complex install process or resolving dependency conflicts? We’ve certainly experienced each of these problems ourselves. But since we […]
Jordan Drysdale & Kent Ickler // Jordan and Kent are back again to continue strengthening organizations’ information security human capital (That’s all you folks!). Organization Leadership and Security Practitioners can gain understanding on the potential designed-to-fail Purple Teams initiatives never reached their full potential. The Duo reviews how systemic organizational career pathing created an insoluble […]
The post Webcast: Atomic Purple Team Framework and Life Cycle appeared first on Black Hills Information Security.
Derek Banks // I recently heard something on the news that caught my attention. I suppose that isn’t abnormal these days, but this in particular was the first time I had heard of anything like it. The US Government was considering banning a popular application in use on mobile devices. Not just on government devices, […]
John Strand // Hello all! I wanted to take a few moments and share what we have been up to in conjunction with MetaCTF. We have built a cyber range! https://www.blackhillsinfosec.com/services/cyber-range/ Yes, I know very well that this is not interesting. However, there are a couple of things that are pretty neat about it. First, […]
Joff Thyer has dove into everything that is IPv6 and has so much to share about it. He gets really technical but in a way you’ll be able to understand. Google reports that over 30% of their systems access comes via the IPv6 protocol coming into 2020. Many Internet Service Providers have no remaining choice […]