Fix Me
Threat Modeling for Realz
A Guided Tour of the Internet Ghetto :: Introduction to Tor Hidden Services
Red Teaming: Back and Forth, 5ever
How not to suck at pen testing
Mainframes, Mopeds and Mischief: A PenTester's Year in Review
The Multibillion Dollar Industry That’s Ignored
Code Insecurity or Code in Security
C3CM: Defeating the Command- Control- and Communications of Digital Assailants
Attack Paths
How to Secure and Sys Admin Windows like a Boss.
Red white and blue. Making sense of Red Teaming for good.
Around the world in 80 cons
Mirage — Next Gen Honeyports
They touched you WHERE? When trusting a security questionnaire isn’t enough!
Active Directory: Real Defense for Domain Admins
The Wireless World of the Internet of Things
Open Source Threat Intelligence: Developing a Threat intelligence program using open source tools and public sources
Once upon a time… (InfoSec History 101)
Hacking Mainframes; Vulnerabilities in applications exposed over TN3270
Single Chip Microcontrollers: Beyond Arduino
Building Better Botnets with IPv6
Bad Advice- Unintended Consequences- and Broken Paradigms
Simple Network Management Pwnd