Cluster Pi
Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling
How to Hug a Hacker
Bringing a project back from hibernation – Reviving Kismet
BSidesROC CTF: QA Session
The Life and Times of Hans Ostmaster
Real security incidents, unusual situations
Letting the Crap Out of the Bag: Adventures Disclosing IoT Bugs
CSRF Attack & Defense
I Know Where You Live: Privacy Issues in Location-Based Apps
Counter UAS (C-UAS)
eSDP – Rings Around Things in the Cloud