Deductive Reasoning: File Analysis Techniques
Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
**** It, Do it Live (PowerShell Digital Forensics)
An Adversarial View of SaaS Malware Sandboxes
Log All The Things! Proactive Forensics using Log Analysis
Content Security Policy - Lessons learned at Yahoo
A deep look into a Chinese advanced attack. Understand it, learn from it and how to detect and defend against attacks like this.
Network Reliability Monitoring for ICS -- Going beyond NSM and SIEM
Stop Treating Data as Instructions!
Fixing XSS with Content Security Policy