tools
Lessons from Teaching Cybersecurity: Week 6
As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a ...
5 Essential Steps to Improve Cybersecurity Maturity
From small- and medium-sized organizations to large enterprises, every business is under continuous threat of security risk in today’s digital world. With the growing digital footprint and cloud adoption, organizations continue to ...
Efficient audits with machine learning and Slither-simil
by Sina Pilehchiha, Concordia University Trail of Bits has manually curated a wealth of data—years of security assessment reports—and now we’re exploring how to use this data to make the smart contract ...
PrivacyRaven Has Left the Nest
By Suha S. Hussain, Georgia Tech If you work on deep learning systems, check out our new tool, PrivacyRaven—it’s a Python library that equips engineers and researchers with a comprehensive testing suite ...
A Guide to Finding a Trusted MSSP
MSSPs can be essential in helping organizations complete their security posture. Here’s what to look for. Enterprises often lack the internal resources to do security right, especially considering tasks and responsibilities are ...
Top 10 Uses of Wireshark for Hackers Part II
In a world... OK, just kidding. This isn't a movie trailer. However, the ever-increasing sophistication of attacks on our networks is no joking matter. To bypass firewalls, IDS/IPS, EPS, DLP and a ...
Top 10 Uses of Wireshark for Hackers Part I
Wireshark fits nicely in any toolbox of the network forensic analyst and ethical hacker. From hundreds of dissectors that decode the protocol and application fields, to the customization capability that enables you ...
Open Source Security: Can Security Be Open?
Open source security is emerging as an important new tool in the rapidly evolving world of software development The history of security looks like a cloak and dagger movie of the cold ...

