Webcasts
X-rays to Hex-rays
Why It's Easy Being a Hacker
How to accelerate your cyber security career
The State of Automation/Integration Practice: Part 1 of the SANS Automation and Integration Survey
Hiding in Plain Sight: Dissecting Popular Evasive Malware Techniques
Osquery: A Modern Approach to CSIRT Analytics
2018 Holiday Hack Challenge Winner Announcement and More!
What's Next in Automation Support: Part 2 of the SANS Automation and Integration Survey
Alternative Network Visibility Strategies for an Encrypted World
Playing Moneyball in Cybersecurity
Security Gets Smart with AI: A SANS Survey
Taming the Endpoint Chaos Within: A Review of Panda Security Adaptive Defense 360
Empowering Incident Response via Automation
Best Practices for Network Security Resilience
Why Traditional EDR Is Not Working--and What to Do About It
Defensible Security Architecture and Engineering – Part 1: How to become an All-Round Defender - the Secret Sauce
All Your Data Belong to Us: How to Defend Against Credential Stuffing
Building a Zero Trust Model in the Cloud with Microsegmentation
“Concepts are explained in a manner that is very easy to follow. They build on each other from one day to the next.”
SEC501: Joshua Morgan, JX