Defense Against the Dark Arts: Examining, Fixing and Fighting for our Cyber Defenses
Securing Network Communications: An Investigation into Certificate Authorities on Mobile
Introducing G.Tool – A batteries included framework for building awesome GRC tools without wasting money.
CANtact: Open Source Automotive Tools
How to build a malware classifier [that doesn’t suck on real-world data]
All roads lead to domain admin, a part of a presentation series: From breach to C.D.E. Part I
Understanding Ransomware: Clear and Present Danger
Eliminating the Automation and Integration Risks of the “Security Frankenstein”
Held for Ransom: Defending your Data Against Ransomware
The Emerging Era of Cognitive Security
An Effective Approach to Automating Compliance Activities
When ‘Oops’ Isn’t An Acceptable Answer
Network virtualization to enhance context, visibility and containment
Securing Our Future
WiFi Exploitation: How passive interception leads to active exploitation
Getting Business Value from Penetration Testing
The State of SCADA on the Internet
Making sense of a million samples per day: Behavior-based Methods for Automated, Scalable Malware Analysis
Can massive data harvesting drive down the time to breach detection?
The Industry Need for Cloud Generation Security
[Ab]using TLS for defensive wins
Safety Should be the Security Paradigm
Jihadism and Cryptography, from internet to softwares
Practical Static Analysis for Continuous Application Security
IPv6 for the InfoSec Pro on the Go
Exposing Ransomware: Intelligent cybersecurity for the real world.
Developing your Career in IT Security
Crash Course in Kubernetes & Security
Security by Consent, or Peel’s Principles of Security Operations
EventID Field Hunter (EFH) – Looking for malicious activities in your Windows events
Hack Microsoft by using Microsoft signed binaries
The Security Problems of an Eleven Year Old and How To Solve Them
Next-Gen Now, Outsmarting ransomware, exploits and zero-day attacks