Blog archive

Practical cybersecurity writing.

Articles on penetration testing, certifications, consumer security, privacy, and the real-world security issues worth paying attention to.

Search by keyword or filter by tag.

Showing 13 of 13 posts

Why Your Penetration Test Report Is Useless (And What to Do About It)

You paid thousands for a PDF nobody reads. Here's how to fix that.

Top 10 Best Cybersecurity Books

The best books about cybersecurity I have read personally, for everyone from beginners to experts.

6 Reasons You Are Wasting Money on Penetration Tests

Why low expectations, junior-only staffing, weak scoping, and unrealistic assumptions can drain value from a pentest.

The 3 Ways to Fail at Your OSCP / OSCP+ Exam Report

How to avoid report-related failure by following instructions, taking notes, and resisting unnecessary complexity.

The Hidden Gem of Pentest Certifications in 2024

A case for the BSCP as an inexpensive, focused certification for people who want to break into web pentesting.

How to perform during the OSCP / OSCP+ exam in 2024

Simple advice for staying effective and composed during a certification exam that often overwhelms candidates.

The 8 Ways You're Getting Hacked

A practical consumer-security guide covering phishing, weak passwords, public Wi-Fi, outdated software, and oversharing.

On the Updated OSCP+ Certification

An opinionated take on the updated OffSec certification and whether the changes improve its value.

The 2024 Pentesting Roadmap: From Beginner to Hired in 8 Steps

A roadmap for building practical skills and moving from entry-level learning toward employability in penetration testing.

How MFA Saves Your Social Media Accounts

Answers to the most common objections to multi-factor authentication on social and email accounts.

This Week in Cybersecurity — 16 September

This week's news in Cybersecurity. Ivanti is the gift that keeps on giving, more fake coding tests, and frustrating days for TfL employees

Tackling the Rising Supply Chain Threats in 2024

Supply Chain attacks are on the rise, and very difficult to defend against. This is how ‘Assumed Breach’ testing can protect your business and help you sleep better at night.

Pentesting Success: Mastering the Presale and Scoping Process

The technical parts of being a pentester is only one side of the story. Unlock the full potential of your pentests by asking the right questions during meetings with potential clients.