In his SecTor keynote, @hdm.io breaks down the rules that shaped the 2000s: what survived, what failed us, and the new rules we’ll need next.
Missed it? 👀 Watch the keynote:
www.runzero.com/resources/on...
In his SecTor keynote, @hdm.io breaks down the rules that shaped the 2000s: what survived, what failed us, and the new rules we’ll need next.
Missed it? 👀 Watch the keynote:
www.runzero.com/resources/on...
Watch the full ThreatCon1 podcast by @vulncheck.bsky.social for the full story: www.runzero.com/resources/cv...
Watch the full ThreatCon1 podcast by @vulncheck.bsky.social for the full story: www.runzero.com/resources/cv...
If your asset inventory has Debian ghosts from 2023 (pre-v8), this one’s for you. 👇
HD’s post: www.runzero.com/blog/managin...
SDxCentral article: www.sdxcentral.com/news/open-so...
If your asset inventory has Debian ghosts from 2023 (pre-v8), this one’s for you. 👇
HD’s post: www.runzero.com/blog/managin...
SDxCentral article: www.sdxcentral.com/news/open-so...
📺 Learn how to approach mission-critical systems in this webcast recap: www.runzero.com/blog/see-sec...
📺 Learn how to approach mission-critical systems in this webcast recap: www.runzero.com/blog/see-sec...
Our own @todb.hugesuccess.org breaks down 3 overlooked internet-wide threats:
1️⃣ Over-indexing on CVEs
2️⃣ AI-generated slop exploits
3️⃣ Hidden version numbers
👉 Watch: www.runzero.com/resources/st...
Our own @todb.hugesuccess.org breaks down 3 overlooked internet-wide threats:
1️⃣ Over-indexing on CVEs
2️⃣ AI-generated slop exploits
3️⃣ Hidden version numbers
👉 Watch: www.runzero.com/resources/st...
@todb.hugesuccess.org has the proton pack (aka free training) and spooky-good questions to help exorcise forgotten devices.
🎃 Read the blog and kick off your fall securing: www.runzero.com/blog/ncsam-e...
@todb.hugesuccess.org has the proton pack (aka free training) and spooky-good questions to help exorcise forgotten devices.
🎃 Read the blog and kick off your fall securing: www.runzero.com/blog/ncsam-e...
Take a stroll through the graveyard of forgotten firmware & cursed connections. These undead devices aren’t just spooky — they’re vulnerable & feeding off your network.
Learn more in our latest blog: www.runzero.com/blog/ncsam-e...
#NCSAM
Take a stroll through the graveyard of forgotten firmware & cursed connections. These undead devices aren’t just spooky — they’re vulnerable & feeding off your network.
Learn more in our latest blog: www.runzero.com/blog/ncsam-e...
#NCSAM