Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
00478_08042020_WebcastDocker

Author, Ethan Robish, Fun & Games, How-To, Informational, Webcasts Docker, ethan robish

Webcast: What Can Docker Do for Me?

Are you tired of spinning up an entire OS in a VM just to run a tool? Have you ever struggled to install a program you needed? When was the […]

Read the entire post here
00476_07232020_HowToAppliedPurpleTeamingLabBuild

Author, How-To, Informational, Jordan Drysdale, Kent Ickler Azure, Detection Lab, Jordan Drysdale, Kent Ickler, purple teaming, Terraform

How To: Applied Purple Teaming Lab Build on Azure with Terraform (Windows DC, Member, and HELK!)

Jordan Drysdale & Kent Ickler // tl;dr Ubuntu base OS, install AZCLI, unpack terraform, gather auth tokens, run script, enjoy new domain.  https://github.com/DefensiveOrigins/APT-Lab-Terraform For those of you who have been […]

Read the entire post here
00477_07302020_WebcastAtomicPurpleTeam

Author, Fun & Games, How-To, Informational, InfoSec 101, Jordan Drysdale, Kent Ickler, Webcasts

Webcast: Atomic Purple Team Framework and Life Cycle

Jordan Drysdale & Kent Ickler // Jordan and Kent are back again to continue strengthening organizations’ information security human capital (That’s all you folks!). Organization Leadership and Security Practitioners can […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00475_07232020_NowThatsWhatICallADHD

Author, How-To, Informational, James Marrs, moth ADHD

Now That’s What I Call ADHD! 4

moth & James Marrs // Introduction After a month of hard work, Python headaches, dependency hell, and a bit of tool necromancy, ADHD4 is here and we’re thrilled to share […]

Read the entire post here
Let’s Talk About TikTok

Author, Derek Banks, Fun & Games, How-To, Informational Derek Banks, TikTok

Let’s Talk About TikTok

Derek Banks // I recently heard something on the news that caught my attention.  I suppose that isn’t abnormal these days, but this in particular was the first time I […]

Read the entire post here
We Have Built a Cyber Range!

Author, Fun & Games, General InfoSec Tips & Tricks, Informational, InfoSec 101, John Strand cyber range, john strand

We Have Built a Cyber Range!

John Strand // Hello all! I wanted to take a few moments and share what we have been up to in conjunction with MetaCTF. We have built a cyber range!   […]

Read the entire post here
00471_06222020_WebcastModernWebappPentesting

Author, Brian King, How-To, Informational, Webcasts webapp

Webcast: Modern Webapp Pentesting: How to Attack a JWT

So much information about testing webapps for security problems is old. Don’t get me wrong, the old stuff still works way more often than we’d like, but there’s more to […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00470_06222020_WebcastIPv6

Author, Fun & Games, How-To, Informational, Joff Thyer, Webcasts IPv6, Joff Thyer

Webcast: IPv6: How to Securely Start Deploying

Joff Thyer has dove into everything that is IPv6 and has so much to share about it. He gets really technical but in a way you’ll be able to understand. […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
00469_06222020_WebcastDurableVsEphemeral

Author, Informational, InfoSec 101, John Strand, Webcasts john strand, Threat Intelligence

Webcast: Durable vs. Ephemeral Threat Intel

In this Black Hills Information Security webcast John breakdowns why he hates threat intelligence… Again… But, he breaks down some of the cool new projects that are focusing on durable […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
«‹ 31 32 33 34›»

Looking For Something?

Browse by category

Recent Posts

  • Proxy execution via WebView2 bannerSigned, Trusted, and Abused: Proxy Execution via WebView2
    An offensive security perspective on Microsoft Edge
  • Getting Started in PentestingGetting Started In Pentesting – Advice From The BHIS Pentest Lead
    Advice about getting started in pentesting from the
  • Tips and Resources for Securing the CloudCloud Security: Tips and Resources for Securing the Cloud
    This overview of the basics of Cloud Security includes

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site