Inside the Black Hole Exploit Kit (BHEK)
Bring Your Own Device: Keeping it Simple and Effective
The Base Rate Fallacy: Information Security Needs To Understand This.
Suicide Risk Assessment and Intervention Tactics
Insider Threat: Hunting for Authorized Evil
Analyzing the Chemistry of Data
Hooked on Packets: Reading Pcaps for D students
"Hacking Back" is a Bad Idea
No-Knowledge Crypto Attacks
Adversarial Decision Making in Critical Infrastructure Cyberattacks
HTTP Header Hunting - A Behavioral Approach to Malware Detection
Attacking NFC Mobile Wallets: Where Trust Breaks Down