Backbone Network Security Visibility In Practice
Baking Pi: Homebrew Lab for Infosec Experiments
Best Practices in online user authentication
Brewing Better Security
CISO? Yeah....I can do that
Contracts, how do they work?
Factoring Macaroons: Building phish and MITM-proof decentralized two-factor auth
How to Join the Infosec Community
I got a shell...now where's the Power?
In Your Mems: Evading Windows AV Using Memory
Mullets, Bacon, and Memes - why we don't give a s$&% anymore about data breaches
Owning MS Outlook with powershell
Physical Penetration Testing - The Finale
Play "Mad Scientist" with Your Own Neural Networks
Poor Man's Rb Atomic Clock
Post-Exploit Threat Modeling with ATT&CK
Preventing a Hostile Matrix: A VR and Game Security Call to Arms
Spawn Camp Cyber Security Essentials and Red vs. Blue (part 1)
Spawn Camp Cyber Security Essentials and Red vs. Blue (part 2)
The Complete CISO
The Dark Web: Understanding The Risks to Your Business
The details of the investigation that resulted in the Mamba Ransomware discovery
The Russians Are Coming! Espionage Story of Indicators
The SOC World: The plan isn't working!
Understanding Why - Cyber security for non-experts
VMs All The Way Down - How to create an inexpensive virtual lab as a powerful, flexible, infosec learning environment.
WCTF Magic as told by a clumsy Magician
Web Hacking 101 - Hands-on with Burp Suite