5G Protocol Vulnerabilities and Exploits
The Hacker’s Guide to Cybersecurity Policy in 2020
The Cyberlous Mrs. Maisel: A Comedic (and slightly terrifying) Introduction to Information Warfare
Choose Your Own Adventure: Ransomware Response!
Cisco SMB Products — Critical Vulnerablities / 0-day Release
Resistance Isn’t Futile: A Practical Approach to Prioritizing Defenses with Threat Modeling
Face/Off: Action Plan for Perils & Privileges of Facial Recognition
Using OSINT for Human Rights and Victim Support
Hacking Democracy: On Securing an Election
Crossing the Border With Your Electronic Devices
Playing the Short Game: The Effects of Data Breaches on Share Prices
Hack the Stars