Improving your protection by automating real world attacks
Role Playing with Intermediate Representations
Insider Threats: Evil Employees and the Nation-states and Competitors who Love Them
Developing a Threat Modeling Mindset
Don’t Touch Me That Way
Bootstrapping A Security Research Project
The Topology of Malicious Activity in IPv4
Mr. Human - Vulnerability Management from the Attacker’s Perspective
Social Media Risk Metrics
Key Attribute Risk Management and Analysis (KARMA)