Social engineering at scale, for fun
Implementing the Three Cs of Courtesy, Clarity, and Comprehension to Optimize End User Engagement
Building A Teaching / Improvement Focused SOC
Modern Political Warfare: A Look at Strategy and TTPs
Legendary Defender - The Voltron Analogy
Not your Grandpa's Password Policy
Vulnerability Management 101: Practical Experience and Recommendations
What is Agile and how can I use it well?
Cruising the MJ Freeway: Examining a large breach in legal Cannabis
Unifying the Kill Chain
Incorporating Human Intelligence (HUMINT) into An Information Security Team
Disabling Encryption to Access Confidential Data
Bypassing Antivirus Engines using Open Sourced Malleable C2 Software, MSFVenom, Powershell and a bit of Guile
Firmware Security 101
The current state of adversarial machine learning
Treble or Trouble: Where Android's latest security enhancements help, and where they fail