RESOURCES & TOOLS
Penetration Testing
Endpoint Security
Cloud Security
Zero Trust
ArkCybr
StationX
Network Security
Identity & Access Management
Encryption
Web Application Security
SIEM
Upstream Rental Equipment
Upstream Tech Solutions
Fraud Detection
OSCP - Offensive Security
Certified Professional certification focusing on hands-on penetration testing skills..
https://www.offensive-security.com/pwk-oscp/Authority: Offensive Security
Reference: -
PTES Technical Guidelines
Penetration Testing Execution Standard defining phases and methodologies..
http://www.pentest-standard.org/Authority: PTES
Reference: -
OWASP Testing Guide
Comprehensive guide for testing web application security vulnerabilities..
https://owasp.org/www-project-web-security-testing-guide/Authority: OWASP
Reference: WSTG v4.2
Metasploit Framework
Open-source penetration testing platform for developing and executing exploits..
https://www.metasploit.com/Authority: Rapid7
Reference: -
Burp Suite
Integrated platform for web application security testing and vulnerability scanning..
https://portswigger.net/burpAuthority: PortSwigger
Reference: -
Microsoft Defender for Endpoint
Enterprise endpoint security platform documentation for threat prevention and detection..
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/Authority: Microsoft
Reference: -
NIST SP 800-171
Protecting Controlled Unclassified Information in nonfederal systems, including endpoint requirements..
https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/finalAuthority: NIST
Reference: SP 800-171 Rev. 2
Deepen Your Defense: OS Hardening & Supply Chain Protection
Learn how to baseline your workstations and prevent supply chain attacks — where most phishing threats succeed..
https://osmachine.com/workstationsAuthority: -
Reference: -
Protect Your Cloud Instances from Supply Chain Attacks
Cloud VMs need hardening too — learn how to baseline Linux cloud instances and detect supply chain compromise before it reaches production..
https://osmachine.com/cloud-instances/linux-cloud/cloud-linux-supply-chain-guideAuthority: -
Reference: -
OSSEC
Open-source host-based intrusion detection system for endpoint monitoring and security..
https://www.ossec.net/Authority: -
Reference: -
Linux Supply Chain Verification Guide
Verify package authenticity, pin repositories, and generate SBOMs on Linux workstations — a step-by-step hardening walkthrough..
https://osmachine.com/workstations/linux-workstations/linux-supply-chain-verification-guideAuthority: -
Reference: -
Windows Supply Chain Security Guide
Protect Windows workstations with Authenticode verification, WDAC policies, and driver signing enforcement..
https://osmachine.com/workstations/windows-workstations/windows-supply-chain-security-guideAuthority: -
Reference: -
OS Machine Baseline Features
Explore the full suite of OS baselining tools and hardening guides for workstations, servers, cloud instances, and IoT devices..
https://osmachine.com/baseline-featuresAuthority: -
Reference: -
AWS Well-Architected Framework
Best practices for building secure, high-performing, resilient cloud infrastructure on AWS..
https://aws.amazon.com/architecture/well-architected/Authority: AWS
Reference: -
Really Simple Security Plugin for WordPress
The WordPress Really Simple Security Plugin installed on the remote host is affected by an Authentication Bypass vulnerability..
https://www.tenable.com/plugins/was/114512Authority: -
Reference: CVE-2024-10924
CSA Cloud Controls Matrix
Cybersecurity control framework specifically designed for cloud computing environments..
https://cloudsecurityalliance.org/research/cloud-controls-matrix/Authority: CSA
Reference: CCM v4
ISO/IEC 27017
Information security controls for cloud services based on ISO/IEC 27002..
https://www.iso.org/standard/43757.htmlAuthority: ISO
Reference: ISO/IEC 27017:2015
ScoutSuite
Multi-cloud security auditing tool for AWS, Azure, and Google Cloud Platform..
https://github.com/nccgroup/ScoutSuiteAuthority: NCC Group
Reference: -
CISA Zero Trust Maturity Model
Model for implementing zero trust principles across enterprise environments..
https://www.cisa.gov/zero-trust-maturity-modelAuthority: CISA
Reference: -
NIST SP 800-207
Zero Trust Architecture framework and implementation guidance..
https://csrc.nist.gov/publications/detail/sp/800-207/finalAuthority: NIST
Reference: SP 800-207
See Mosaic in Action
Prevent identity threats with advanced risk and fraud signals detection and continuous trust evaluation. Simplify identity flows..
https://transmitsecurity.com/request-a-demoAuthority: -
Reference: -
Lock Down Your PC Like a Pro
Think your kid—or that “trustworthy” houseguest—can’t accidentally (or intentionally) nuke your files? Think again. One rogue click and poof: admin access granted, chaos unleashed. Enter the Limited User Account—Windows’ built-in digital straitjacket.
https://arkcybr.com/wp-content/uploads/2024/02/Creating-a-limited-user-account-in-Windows-10-_-11-1.pdfAuthority: Arkcybr
Reference: -
Your 5-Minute Just Do Something Guides
Tired of your kid “fixing” your Mac into a $2,000 brick? Or your spouse installing mystery toolbars that phone home to Siberia? Just Do Something Guides drop dead-simple, no-BS playbooks that turn chaos into control—in the time it takes to brew coffee..
https://arkcybr.com/just-do-something-guides/Authority: Arkcybr
Reference: -
Ransomeware is the #1 Threat to Home Users
The full breakdown reveals the wild evolution of crime at home. How does it sneak in? One wrong click: a shady download, phishing email, or "free" software that’s anything but. These aren’t lone hackers in hoodies.
https://www.youtube.com/watch?v=20GFZP-PR2MAuthority: -
Reference: -
Land Your First Cybersecurity Job Fast
Free eBook: 5-step blueprint to snag your first entry-level cyber job – no prior experience needed..
https://www.stationx.net/how-to-get-a-job-in-cyber-security-fast/#free-kitAuthority: StationX
Reference: -
Cyber Security Diaries from StationX
Nathan with StationX details the salary ranges, essential tools, and valuable certifications for each skill set. .
https://www.youtube.com/watch?v=_Hgi_RLDALoAuthority: -
Reference: -
RFC 4301 - Security Architecture for IP
IP Security (IPsec) architecture providing authentication and encryption for network traffic..
https://datatracker.ietf.org/doc/html/rfc4301Authority: IETF
Reference: RFC 4301
NIST Cybersecurity Framework
Framework for improving critical infrastructure cybersecurity with focus on network security controls..
https://www.nist.gov/cyberframeworkAuthority: NIST
Reference: CSF 2.0
CIS Controls
Prioritized set of actions for cyber defense with network security safeguards..
https://www.cisecurity.org/controlsAuthority: CIS
Reference: CIS Controls v8
pfSense
Open-source firewall and router software providing comprehensive network security features..
https://www.pfsense.org/Authority: Netgate
Reference: -
Snort
Open-source intrusion detection and prevention system for real-time network traffic analysis..
https://www.snort.org/Authority: Cisco
Reference: -
SSID Security - Secure your Wifi
Identify risks Is the WiFi public or private? What is the worst that could happen? Slow speeds due to bandwidth, data leaks. If privacy is not a concern, then how about bandwidth? With great bandwidth comes great responsibility. Setup monitoring to establish a baseline.
https://youtu.be/_zCNz319vCg?si=GBBUDzNdYOXlnwQSAuthority: -
Reference: -
RFC 6749 - OAuth 2.0
OAuth 2.0 authorization framework for secure delegated access..
https://datatracker.ietf.org/doc/html/rfc6749Authority: IETF
Reference: RFC 6749
RFC 7519 - JSON Web Token
Compact, URL-safe means of representing claims for secure information transfer..
https://datatracker.ietf.org/doc/html/rfc7519Authority: IETF
Reference: RFC 7519
NIST SP 800-63
Digital Identity Guidelines for identity proofing and authentication..
https://pages.nist.gov/800-63-3/Authority: NIST
Reference: SP 800-63-3
Keycloak
Open-source identity and access management solution with SSO and federation..
https://www.keycloak.org/Authority: Red Hat
Reference: -
RFC 8446 - TLS 1.3
Transport Layer Security protocol for encrypted communications..
https://datatracker.ietf.org/doc/html/rfc8446Authority: IETF
Reference: RFC 8446
FIPS 140-3
Security requirements for cryptographic modules used in encryption systems..
https://csrc.nist.gov/publications/detail/fips/140/3/finalAuthority: NIST
Reference: FIPS 140-3
OpenSSL
Robust, full-featured toolkit for TLS and SSL protocols and general cryptography..
https://www.openssl.org/Authority: -
Reference: -
WP Engine has fired back at Automattic’s countersuit with a motion to dismiss
WP Engine has moved to dismiss all seven counterclaims filed by Automattic, Matt Mullenweg, the WordPress Foundation, and WooCommerce, arguing they are untimely under the laches doctrine due to a nearly 15-year delay since WP Engine's 2010 trademark use—despite Automattic's awareness and prior equity stake..
https://www.therepository.email/wp-engine-moves-to-dismiss-automattics-counterclaims-arguing-they-were-filed-too-lateAuthority: -
Reference: -
OWASP Top 10
Standard awareness document for developers and web application security..
https://owasp.org/www-project-top-ten/Authority: OWASP
Reference: OWASP Top 10 2021
OWASP ASVS
Application Security Verification Standard for testing web application security controls..
https://owasp.org/www-project-application-security-verification-standard/Authority: OWASP
Reference: ASVS 4.0
ModSecurity
Open-source web application firewall (WAF) engine for protecting against attacks..
https://github.com/SpiderLabs/ModSecurityAuthority: Trustwave SpiderLabs
Reference: -
OWASP ZAP
Free security scanner for finding vulnerabilities in web applications..
https://www.zaproxy.org/Authority: OWASP
Reference: -
WP Engine feud - ongoing?
A bitter public feud between Automattic CEO and WordPress co-founder Matt Mullenweg and major hosting provider WP Engine has escalated.
https://www.youtube.com/watch?v=m8t76ToNRI0Authority: https://techcrunch.com/2021/10/19/automattic-tc1-origin/
Reference: -
NIST SP 800-92
Guide to Computer Security Log Management for SIEM implementation..
https://csrc.nist.gov/publications/detail/sp/800-92/finalAuthority: NIST
Reference: SP 800-92
Elastic Security
Open-source SIEM solution built on Elasticsearch for threat detection and response..
https://www.elastic.co/securityAuthority: Elastic
Reference: -
Wazuh
Free, open-source security monitoring platform for threat detection and compliance..
https://wazuh.com/Authority: -
Reference: -
Customized Audio-Visual Rental
Imagine Your Next Event—Audio-visual isn’t just part of your meeting or conference. From a single speaker to a packed auditorium, seamless AV transforms how your message lands. And the best part? It’s easier—and more powerful—than you think.
https://crsrental.com/computer-rentals/audio-visual-equipment/Authority: Upstream Tech Solutions
Reference: -
Technical support at Trade Shows
#laptoprental Upstream Tech Solutions Technical support at Trade Shows A trade show, convention, or event requires more than a basic rental. At the core of an event, a team of technicians will carry the load. Events require experience, planning, preparation, and support from a skilled team with strategic solutions.
https://youtu.be/L5QBVXCOHN8Authority: -
Reference: -
Laptop Rentals in Dallas
#laptoprental Upstream Tech Solutions Technical support at Trade Shows A trade show, convention, or event requires more than a basic rental. At the core of an event, a team of technicians will carry the load. Events require experience, planning, preparation, and support from a skilled team with strategic solutions.
https://youtu.be/L5QBVXCOHN8Authority: Upstream Tech Solutions
Reference: -
Exposure through Virtual Business Cards
Limiting Exposure to 3rd Party access.
https://youtu.be/sGPIjvi4K0oAuthority: -
Reference: -
Pay Per Click Report
why waste a single pay-per-click advertising dollar on non-potential customers? My client uses paid search to drive traffic to their website and recently discovered a drastic ad targeting conversion rate dip that affected their ads campaign performance. It was strange, his ad campaign was active, and there were multiple clicks, but customers from Google ads were no longer reaching his business..
https://youtu.be/ZdOT54FtcacAuthority: -
Reference: -