How to Measure Your Security: Holding Security Vendors Accountable
How we accidentally created our own RAT/C2/Distributed Computing Network
Active Defense for web apps
IoT Security – Executing an Effective Security Testing Process
Fileless Malware - The New “Cyber”
Hunting Lateral Movement for Fun and Profit
(Mostly) Free Defenses Against the Phishing Kill Chain
Advanced Threat Hunting
CHIRON - Home based ML IDS
Blue Team Keeping Tempo with Offense
Data Mining Wireless Survey Data with ELK
How to KickStart a Drone JailBreaking Scene
Web Application testing - approach and cheating to win
When IoT Research Matters
I want my EIP
EDR, ETDR, Next Gen AV is all the rage, so why am I enraged?
Kinetic to Digital: Terrorism in the Digital Age
Hacking Blockchains
Winning (and Quitting) the Privacy Game: What it REALLY takes to have True Privacy in the 21st Century; or How I learned to give in and embrace EXIF tags