2FA-Enabled Fraud: Dissecting Operation High Roller
The Hacker Ethos meets The FOSS Ethos
Hacking Survival: So. You want to compute post-apocalypse?
Collecting Underpants To Win Your Network
Flex Your Rights: The Constitution & Political Activism in the Hacker Community
Penetration Testing from a Hot Tub Time Machine
Tactical Surveillance: Look at me now!
How to create a one man SOC
A Fool’s Game: Building an Awareness & Training Program
Vulnerability Spidey Sense – Demystifying Pen Testing Intuition
Everything you wanted to know about Academia (But were too afraid to ask)
What locksport can teach us about security
Exploit Development with Ruby – An Intro
Separating Security Intelligence from Security FUD
Dirty Red Team Tricks II
Write Your Own Tools With Python!
Intro to Linux System Hardening, and Applying it to BackTrack Linux
Taming Skynet : Using the Cloud to Automate Baseline Scanning
Current Trends in Computer Law