Practical optical key-duplication attacks via superresolution sensing
Cryptography Pitfalls
Hacking your local government
TCP Exploits
SQL Server Hacking on Scale using PowerShell
Borders for Dummies
Cryptocurrencies: You keep using that word, anonymity. I do not think it means what you think it means.
Why and How to Teach People _Cyber_ Isn't A Thing
Transitioning to AWS in a Hurry Without Getting Owned
TBA
Nothing personal, It's just Skype for Business
You did what with SHA1 again?
Threat Intelligence 101: Separating Signal from Noise
Unleashing the Dogs of [Cyber] War
Finding Your Way to Domain Admin Access and Even So, the Game Isn't Over Yet.
Something to hide - Why privacy matters and how to get yours back
Why We Fight: A Call to Cyber Service