Training

Cyber News Roundup: What to Expect at Black Hat and DEF CON

Your phone is leaking your personally identifiable information (PII). Learn how to break modern encryption and hack into a car. Explore ways to hack physical security, including disabling alarm systems and cameras. Hear lessons learned from running a national penetration testing competition. These are just some of many topics that will be explored – and…

Read More

Oregon Cybersecurity Leader Charlie Kawasaki Featured on KGW

While many people understand the need to build a larger cybersecurity workforce with trained cybersecurity experts, it takes dedicated cybersecurity leaders to push this initiative forward. One standout in this effort is Charlie Kawasaki, vice chair of the Oregon Cybersecurity Advisory Council (OCAC), CTO of PacStar, and co-founder of NW Cyber Camp – which kicks…

Read More

12 Ways to Get a Handle on Secrets Management

Organizations in all industries have secrets that need to be protected. The modern identity landscape is filled with secrets — passwords, encryption keys, cryptocurrency wallets, SQL connection strings, storage account keys, API tokens — yet organizations are challenged with storing, managing, and protecting them. Let’s define “secrets” as some knowledge or a piece of data…

Read More