Beyond the MCSE: Active Directory for the Security Professional
Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root
Xenpwn: Breaking Paravirtualized Devices
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Account Jumping Post Infection Persistency & Lateral Movement in AWS
Security Through Design - Making Security Better by Designing for People
Dungeons Dragons and Security
Advanced CAN Injection Techniques for Vehicle Networks
Analysis of the Attack Surface of Windows 10 Virtualization-Based Security
Windows 10 Mitigation Improvements
VOIP WARS: The Phreakers Awaken
Behind The Scenes of iOS Security
Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?