Rescuing the Prince of Persia from the Sands of Time
2FA-Enabled Fraud: Dissecting Operation High Roller
Nonverbal Human Hacking
The Hacker Ethos meets The FOSS Ethos
Hacking Survival: So. You want to compute post-apocalypse?
Privilege Escalation with the Metasploit Framework
Collecting Underpants To Win Your Network
Pentesting for non-pentesters: learning through virtual machines
Building Security into your Mobile Application
Moar Anti-Forensics – Moar Louise
Security Epistemology: Beliefs, Truth, and Knowledge in the Infosec Community
Pen Testing Security Vendors
Building the Next Generation IDS with OSINT
Pentesting iOS Applications
Creating A Powerful User Defense Against Attackers
Hunting Evil
Security Onion: Network Security Monitoring in Minutes
Ambush – Catching Intruders At Any Point
Ghost in the Wires: The Unbelievable True Story of Kevin Mitnick’s Life as a the World’s Most Wanted Computer Hacker
You Can't Buy Security. Building an Open Sourced Information Security Program
Building a Database Security Program
Why Isn’t Everyone Pulling Security, This is Combat
Sprinkler: IR