#1LinuxThingADay: Everyday Linux Use Cases
5G: Security Pitfalls and Considerations
A 'Radiography' of the [In]Security of PACS & DICOM Systems
Audit Compliance != Secure
Booting a PDP-11/70 from Virtual Papertape
Breaking and Entering with SDR: Hacking Physical Access Control Systems and Garage Door Openers, or How I Beat Up Wiegand Over VHF/UHF
Challenged by Your Job Search? So Are We All! Learn Key Job Search Tips
Confessions of a Recovering Linux Admin
Convergence: An Analytical Deep Dive into Foreign Intelligence Activity in US Based Critical Infrastructure
Creating an Effective Security Posture
Creating an off the shelf implantable computer
Game Theory For Hackers
GAN & Gone, manipulation of the masses for political and social gains
Get More Than a Tshirt from Your Community Volunteering
Hacker MBA: Soft Skills for Hackers
How Neurodiversity can be Leveraged for an Excellent ROI
How To Train Your Customers: Changing the Course of Support
Intro to Reverse Engineering with Ghidra: Taming the Dragon
Real-world attacks against Rackspace - Rodney Beede
Recruiter Panel: Everything You Wanted to Know About a Recruiter, But Were Afraid to Ask
Starting A Cybersecurity Career: Which role should you pursue?
Talking to lawyers (without catching a case), or, "Counsel advises..."
The 5 Laws of Librarianship in your Intel Operation
The Gogol Project; Lessons Learned Building My First CTF
The Hunter Games: How to find the adversary with EQL
There's no place like 169.254.169.254 - Ab(using) cloud metadata URLs
Unmasking Data Leaks: A Guide to Finding, Fixing, and Prevention
Virtualization Automation with Ansible
When Refrigerators attack! Defending yourself against rogue appliances