wolfshirtz
The NCL Player Ambassadors have been asked this question many times over the years. Wolfshirtz offers a definitive answer, but first poses this insightful counter-question: "Why mathematically garble your data to hide it when you can make it look like a dinosaur with a cool top hat?"
Tag: Tech Talk
What is HTTP Request Smuggling and Why Do I Care?
WebWitch
WebWitch examines the reemergence of HTTP Request Smuggling as an allegory for the dangers of making assumptions about older programs and protocols when the cybersecurity landscape is constantly shifting. Their perspective on research topics in cybersecurity (and the Oxford comma) will help you start thinking like a seasoned professional.
Breaking Boards: Hacking Hardware
wolfshirtz
If you like cybersecurity but prefer to work with your hands, there's a way you can do both: hardware hacking! This beginner-level introduction from wolfshirtz will show you how to get started.
A Day in the Life of a Cyber Engineer
Jacob "gond0r" Corley
Jacob Corley works both sides of cybersecurity—offense and defense. Once he breaks a web application, he's then tasked with fixing it. Jacob chronicles one day on the job in which he goes from discovering a vulnerability to finalizing a patch for it.
The Joy of Smart Home Automation
MistressVenom
The Internet of Things is often criticized for its security risks. MistressVenom is a fan of network security, but she also became a fan of smart homes after chronic illness threatened her independence. How did she reconcile the two?
At Grace Hopper (GHC17): Find Your Inner Tech Talk in 60 Minutes
You may ask yourself, "What impact could I possibly have on the technical community at such an early stage in my career?" That question is answered very quickly after you ask yourself 52 other questions. CryptoKait recounts her experience at this inspiring workshop and some of those questions (with four minutes to spare!).
You must be logged in to post a comment.