
Q and A: Chris Dunning-Walton, Managing Director and Head of Search at InfoSec People
Comfortably Dumb sat down with Chris Dunning-Walton, Managing Director and Head of Search at InfoSec People to talk about his journey in.

Recruiter Advice: The Perks of (Not) Being A Wallflower: 4 Networking Tips
As a Recruiter, I choose to go to a lot of events and meetups. Here are some tips I used personally to network.

An Introduction to Crimeware-as-a-Service
Ever noticed that almost every piece of software wants you to subscribe to it these days, rather than owning it?

Peeping Pervs and Hidden Cameras
There has been a rise in the cases of criminals using hidden micro-cameras to make illicit recordings of people. From public bathroom...

Impostor Syndrome - An Ever-Present Spectre
If you're reading this site - I'm gonna go out on a limb and say that you're pretty smart. Learn to spot and help manage "impostor syndrome"

Cyberbullying
I suffered intense bullying because of my geeky personality, my tribe and my brains. Cyberbullying is a whole other kettle of fish!

Isolation in InfoSec by Stuart Barker
A massive problem in cyber security is isolation. The feeling of isolation and being alone. It can impact on careers and people.

Stealing Hearts, Securing Minds: Persona 5 And Penetration Testing by James Riley
For this article I thought I would do something different; I figured I would combine two of my loves – video games and pentesting!

OffSec & OSCP : Embracing The Suck and Managing Your Mental State
Offensive Security Certified Professional's entirely practical structure/learning curve has given it a fearsome reputation - we can help!

RowHammer of The Gods - A Whistlestop Tour of Election Security
Trust in Western democracy is not at its highest, it is safe to say. Check out this tour of how voting machines work!

Recruiter Advice: Sean Hendon, Cybersecurity Recruiter @ CBSButler
Recruiters get a bad rep, but a lot of them will happily share knowledge with you. Sean Hendon is a great guy recruiting at CBSButler.

Recommended Reading: Hacking - The Art Of Exploitation by Jon Erickson
Hacking - The Art Of Exploitation by Jon Erickson is under the spotlight in this article - this is not for the faint of heart!

Recommended Reading: Network Security Assessment by Chris McNab
Network Security Assessment by Chris McNab is what we're looking at today - this is just a handy book period for anyone in cybersecurity.

Recommended Reading - The Web Application Hacker's Handbook, 2nd Ed. by D.Stuttard/M.Pinto
The Web Application Hacker's Handbook, 2nd Edition by Dafydd Stuttard and Marcus Pinto is under the spotlight today! Check it out here.

Recommended Reading: Penetration Testing - A Hands-On Introduction To Hacking
Recommended Reading are quick posts highlighting those books, courses and software that are true force-multipliers.

Kids and Phones - Dorian's Advice to Protect Your Kids
Children are being failed by this generation of parents in regards to their #onlineprotection; regularly.

Q and A: Courtney Evans, Cybersecurity University Student and Aspiring Pentester/Exploit Developer
Courtney Evans is an aspiring penetration tester and exploit developer, and somewhat of a buffer overflow connosieur.

The DMARC Protocol - What The Hell Is It? (Phishing Part 2)
In response to a question DM'd to me by a connection from #SierraLeone, these are the basics of DMARC.
Q and A: Matthew Lashner, OSCP - IT Auditor, Security and Privacy at Vanguard
What were you doing before you decided to go into cybersecurity? "I decided to go into cybersecurity in high school.."
![[Original size] White and Pink Strikeout](https://static.wixstatic.com/media/8264b6_7b0a194fbd554fac92d9b94b2375c5e8~mv2.png/v1/crop/x_52,y_156,w_384,h_171/fill/w_446,h_199,al_c,lg_1,q_85,enc_avif,quality_auto/%5BOriginal%20size%5D%20White%20and%20Pink%20Strikeout.png)



























