Securing Network Communications: An Investigation into Certificate Authorities on Mobile
Eliminating the Automation and Integration Risks of the “Security Frankenstein”
WiFi Exploitation: How passive interception leads to active exploitation
[Ab]using TLS for defensive wins
Crash Course in Kubernetes & Security
How To Secure Serverless Applications
Why Technology is Not the Answer to Cybersecurity
AirBnBeware: short-term rentals, long-term pwnage
Lessons Learned Hunting IoT Malware