Using open source SSL/TLS data to hunt threat actors and defend networks
Managing Audits: A Human Interaction Perspective
Who Watches the Smart Watches?
Cyber Vulnerabilities of America's Pipeline Systems
The Value of Deceiving Attackers
Draining the AppSec Pond - A Developer's Perspective
Attacking Automation: Hacking For The next Fifty Years
Deserialized to Life: The Story of My January CVEs
In Case of Emergency: Anonymity - A Technical Guide
Beyond Automated Testing