Convergence: An Analytical Deep Dive into Foreign Intelligence Activity in US Based Critical Infrastructure
Booting a PDP-11/70 from Virtual Papertape
Challenged by Your Job Search? So Are We All! Learn Key Job Search Tips
Creating an off the shelf implantable computer
Unmasking Data Leaks: A Guide to Finding, Fixing, and Prevention
How To Train Your Customers: Changing the Course of Support
Creating an Effective Security Posture
Recruiter Panel: Everything You Wanted to Know About a Recruiter, But Were Afraid to Ask
Audit Compliance != Secure
When Refrigerators attack! Defending yourself against rogue appliances
Intro to Reverse Engineering with Ghidra: Taming the Dragon
A 'Radiography' of the [In]Security of PACS & DICOM Systems
Starting A Cybersecurity Career: Which role should you pursue?
The Hunter Games: How to find the adversary with EQL
Game Theory For Hackers
The Gogol Project; Lessons Learned Building My First CTF
How Neurodiversity can be Leveraged for an Excellent ROI
There's no place like 169.254.169.254 - Ab(using) cloud metadata URLs
#1LinuxThingADay: Everyday Linux Use Cases
Virtualization Automation with Ansible
Get More Than a Tshirt from Your Community Volunteering
GAN & Gone, manipulation of the masses for political and social gains
Real-world attacks against Rackspace - Rodney Beede
The 5 Laws of Librarianship in your Intel Operation
Hacker MBA: Soft Skills for Hackers
Breaking and Entering with SDR: Hacking Physical Access Control Systems and Garage Door Openers, or How I Beat Up Wiegand Over VHF/UHF
Confessions of a Recovering Linux Admin
5G: Security Pitfalls and Considerations
Talking to lawyers (without catching a case), or, "Counsel advises..."