Podcasts

Trust Me I’m Certified, O'Shea Bowens (Part 2)

Finding your strategy (and a little social engineering) for "what's next" with O'Shea Bowens - Part ...
Jason Nickola
Blog Post

Flexible Binary Exploitation with Pwndocker

Whether you’re looking to create a custom exploit while pentesting a client environment or just ...
Duane Laflotte
Podcasts

Trust Me I’m Certified, O'Shea Bowens (Part 1)

Finding your strategy (and a little social engineering) for "what's next" with O'Shea Bowens - Part ...
Jason Nickola
Podcasts

Movers & Shakers with Dr. Deborah Osgood

Movers & Shakers with Dr. Deborah Osgood featuring Jason Nickola Pulsar Security COO Jason Nickola ...
Jason Nickola
Blog Post

InfoSec Careers: Figure Out The Why

Proud To Be Pulsar: A Successful Jump from Military Veteran to Offensive Hacker Pulsar Security is ...
Jill Stagner - Director of Marketing and Program Dev
Blog Post

Ransomware Beware Part 2: Principle of Least Privilege

Finally – part 2 of the long-time coming Ransomware Beware Blog! Sorry for the delay folks – ...
Tim Connell - Head of Enterprise Products