Presenting Security Metrics to the Board / Leadership
Deceive and Succeed: Measuring the Efficiency of a Deception Eco-System in Post-Breach Detection
Adding Ramparts to your Bastille: An Introduction to SELinux Hardening
You Are Being Manipulated
Connections: Eisenhower and the Internet
Automated Dorking for Fun and Profit^WSalary
Verifying IPS Coverage Claims: Here's How
Crawling for APIs
To Catch An APT: YARA
How to Find 1,352 WordPress XSS Plugin Vulnerabilities in 1 Hour (not really)
HTTP/2 & QUIC: Teaching Good Protocols To Do Bad Things
Now You See Me, Now You Don't
Attacks on Enterprise Social Media
Dynamic Population Discovery for Lateral Movement Detection (Using Machine Learning)
Fuzzing For Humans: Real Fuzzing in the Real World
Mining VirusTotal for Operational Data and Applying a Quality Control On It
Fiddler on the Roof: A No-Nonsense Look at Fiddler and Its Usage
Building a Local Passive DNS Tool for Threat Intelligence Research
LTE and Its Collective Insecurity
Incident Code Name: When SkyFalls A Shaken, Not Stirred, James Bond Tale on Incident Response