Battling Supermutants in the Phishing Wasteland
Command and KubeCTL: Real-World Kubernetes Security for Pentesters
Airplane Mode: Cybersecurity @ 30,000+ Feet
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Review Process From the Ground Up
Teen Hacks for Obfuscating Identity on Social Media
Software Mitigations for Hardware Vulnerabilities
SBOM: Screw it, We’ll Do it Live!
Security Researcher OPSEC
Anti-Forensics for Fun and Privacy
Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
Real World Zero Trust Implementation
Project Everest: Fast, Correct, and Secure Software for Deployment Now!