Gen Y—Getting Them to Talk Rather than Text at Work
Battle Scars And Friendly Fire: Threat Research Team War Stories
Unmasking Miscreants
gitDigger: Creating useful wordlists from public GitHub repositories
PowerShell and Windows Throw the Best Shell Parties
Owning Computers Without Shell Access
Sixnet Tools: for poking at Sixnet Things
Promoting Your Security Program Like A Lobbyist.
Abusing LFI-RFI for Fun,Profit and Shells
Hardening Windows 8 apps for the Windows Store
Intro to Dynamic Access Control in Windows Server 2012
Evolutionary Security – Embracing Failure to Attain “Good Enough”
DIY Forensics: When Incident Response Morphs into Digital Forensics
ANOTHER Log to Analyze – Utilizing DNS to Discover Malware in Your Network
Phishing Frenzy: 7 seconds from hook to sinker
Electronic Safe Fail: Common Vulnerabilities in Electronic Safes
The Good Samaritan Identity Protection Project – www.thegsipp.org
Some defensive ideas from offensive guys.
Raising Hacker Kids: For Good or for Awesome
Grim Trigger
Stealth servers need Stealth Packets
A n00bie’s perspective on Pentesting…
My Security is a Graph – Your Arguement is Invalid
Follow the Foolish Zebras: Finding Threats in Your Logs
Security Training and Research Cloud (STRC)
Passive Aggressive Defense
So you want to be a pentester?
Digital Energy – BPT
An Anti-Forensics Primer
What if Petraeus was a hacker? Email privacy for the rest of us
First line of defense