Social Media PODs for Security

Social Media PODs have been used on Instagram, Facebook, and Linkedin. Social PODs are a technique to “hack” algorithm which governs feeds. The Security-Social-POD’s goals are not as elaborate. The focus will be the expand our social media reach while having a group of like-minded security professionals focuses on specific security themes. Our curated Linkedin,

Welcome to CyberWar & LongTerm Ramification Unleashed by Russia’s War

Cyberwar is today’s reality. We’ve moved from a world of cyber-criminal threats to an interconnected arena where any malicious activity is feasible. Cyber-Kinetic attacks that destroy, kill, and massively disrupt civil society are part of our new security threat landscape reality. Geography will not help. The massively interconnected Internet means that you are a cyberwarrior’s

Loading Spoofer to Fight DDoS

Do you run a network? Do you secure an organization? Do you build applications? Do you want DDoS Attacks to be easy? Of course not! Everyone running, securing, or building something on the Internet does not want it easy to attack that service. We’re asking people to load the Spoofer application to Fight DDoS. Loading Read More

Practical Security Guides, Projects, & Workbooks

Do you feel overwhelmed by the barrage of security white papers, webinars, and guides? Are you parallized trying to figure out what you need to do first to get ready for the next attack? We don’t need more security guides, we need a consolidated landing that pulls in all the advice into one place. We