Internet of Things, Voice Control, AI, and Office Automation: BUILDING YOUR VERY OWN J.A.R.V.I.S.
Mind Reading for Fun and Profit using DISC
Hunting for Exploit Kits
Next Gen Web Pen Testing: Handling modern applications in a penetration test
Beyond The 'Cript: Practical iOS Reverse Engineering
Adaptation of the Security Sub-Culture
Outlook and Exchange for the Bad Guys
Privileged Access Workstations (PAWs)
Living Off the Land 2: A Minimalist's Guide to Windows Defense
I don't give one IoTA: Introducing the Internet of Things Attack Methodology
Hacking with Ham Radios: What I have learned in 25 years of being a ham.
Introducing DeepBlueCLI, a PowerShell module for hunt teaming via Windows event logs
Attackers Hunt Sysadmins - It's time to fight back
Python 3: It's Time
So You've Inherited a Security Department, Now What?
Recharging Penetration Testing to Maximize Value
Yara Rule QA: Can't I Write Code to do This for Me?
Mobile Device Forensics
IoT Defenses - Software, Hardware, Wireless and Cloud