
Security awareness
AI best practices: How to securely use tools like ChatGPT
Artificial intelligence (AI) tools like ChatGPT can help with your job tasks, but they can also pose a security risk if not used correctly. Learn how to use these tools safely.

Security awareness
4 mistakes every higher ed IT leader should avoid when building a cybersecurity awareness program
Education was the most hacked sector last year. Learn how to build an effective higher ed security awareness program — and what mistakes to avoid.

Industry insights
Twitter’s cybersecurity whistleblower: What it means for the community
The recent whistleblower complaint against Twitter highlights the disconnect between cybersecurity experts and executives in organizations.

Industry insights
4 key takeaways from the 2022 Verizon DBIR report
Here's what cybersecurity professionals need to know about the latest version of the Verizon Data Breach Investigations Report (DBIR).

Industry insights
The ransomware paper (part 3): New trends and future concerns
The ransomware economy may shift towards consumer attacks as those attacks become more profitable, explains Infosec's Keatron Evans.

Industry insights
The ransomware paper (part 2): Real-life scenarios and lessons learned
The current IT and cybersecurity culture is part of the underlying problems with ransomware. Keatron Evans explains using case studies from the trenches.

Industry insights
The ransomware paper (part 1): What is ransomware?
Ransomware is everywhere, but it’s not always understood. Keatron Evans breaks down the ransomware fact and fiction based on insights from the trenches.

Hacking
An Introduction to Linux Commands in Kali
Transcription[pkadzone zone="main_top"] We are going to be looking at some of the basics of Linux.. This is really just to get you started - to get yo

General security
The Evolution of a Technical Information Security Professional
During my years of work as a consultant and trainer in the information security world, I've noticed a few patterns that usually exist in those who do very we

Digital forensics
Flesh Tone Analysis – Intermediate Computer Forensics
This analysis comes in handy in computer forensics cases such as porn or child pornography investigations. This video shows how to search through hundreds of

Hacking
SQL Injection – Another hacking how-to
We wanted to get up a brief demo of the ubiquitous SQL Injection. We use it here to get control of the OS. We'll have a lot more angles on SQL Injection - as

Hacking
An introduction to Bash Scripting for automating some nmap recon
This is a brief intro to automating recon through bash scripting. This example uses nmap scans that we're automating. We teach this and much more in our pen