Sharing is Caring: Understanding and measuring Threat Intelligence Sharing Effectiveness
Overcoming Imposter Syndrome (even if you’re totally faking it)
You sunk my battleship!
Turning Credential Harvesting Into Credential Clearcutting: Phishing 2FA Systems
Securitygenic: Fighting User Apathy and Indifference
Prime Time Cyber Heists – Reporting from the Trenches!
Don't be stupd on GitHub
Playing with Pictures: Adult Coloring on the Internet
Improving mobile security with forensics, app analysis and big data
Social Untrust
Cyber Vulnerabilities of America's Pipe Lines
Corporate Espionage Without the Hassle of Committing Felonies
Cybersecurity Research: Pushing the Boundaries
Deploying a Shadow Threat Intel Capability: Understanding YOUR Adversaries without Expensive Security Tools
Abusing Linux Trust Relationships: Authentication Back Alleys and Forgotten Features
A Major New Trend in the Enterprise is Whitelisted Proxies
Mo Money Mo Problems: The Clean(ish) Cashout