Aug
19
How do you get hiring managers to say “I want that person on my team!”? It’s all about your experience and writing your resume in a way that showcases your skills as the right candidate for each employer. Read More
Feb
02
In the conclusion of the Fingerprinting section of our Pentesting 101 series we cover hiding while fingerprinting. Need to catch up? Check out our entire Pentesting 101 series here.  Read More
Jan
28
  Thursday, January 28th is Data Privacy Day, the official global initiative that aims to provoke dialogue and empower people and companies to take action. Millions of people have no idea how much of their personal information is being collected, stored & shared. This Data Privacy Day, INE is encouraging people to take time to review some specific privacy settings in order to safeguard their cybersecurity. Read More
Jan
12
So far in the introduction to penetration testing series of articles, we have covered non-intrusive ways of gathering intelligence on a target network. Using Technical and Human OSINT helped create a picture of the target network that is subject to a penetration test through unobtrusive means. If you’re just joining us in this series, we define Technical OSINT as gathering technical data on a target network through tools and web searches. Human OSINT is gathering data on the human aspect of the... Read More
Nov
20
Red team tactics are at the heart of cyber security with organizations around the world offering rewarding, high-salary careers to ethical hackers who understand the importance of penetration testing. No matter where you’re at in your InfoSec journey, there’s an INE cyber security learning path for you. Here’s a look at our red team training, all included with your Cyber Security subscription. Read More
Nov
04
HONEST Security’s Amber Holcomb discusses innovations in Internet of Things connected devices and how to keep IoT safe from cyber criminals. Amber Holcomb is Director of Operations at HONEST Security. She is passionate about encouraging and supporting young women in STEM and empowering women in the tech industry.  Read More
Oct
22
Today’s breaches continue to start with compromised email accounts, with monetary gain remaining the top motivation for stealing login credentials. Typically, these are opportunistic attacks, a sort of spray and pray tactic. According to ProofPoint’s report Human Factor 2019, 25% of phishing emails in 2018 were generic credential harvesting. Phishing is the number one attack vector, mainly because social engineering is still a wildly successful way to compromise users because so many people... Read More
Oct
14
October is Cyber Security Awareness Month. Today we're discussing what  a Business Email Compromise is, and why cyber security professionals should care.  Read More

Subscribe to INE Blog Updates

New Blog Posts!