- The Researcher’s Guide to the IoT Galaxy
- “I” Before “R” Except After “IOC”
- Simplifying Cyber Security and Today’s Growing Regulatory Compliance
- The “Big Security Flaw” & What CUs Must Know about Meltdown & Spectre
- Tabletop Exercise: Migrating Business Data to the Cloud
- 5 Low-Cost Cyber-Security Tips To Guard Against 85% Of Known Threats
- Forging Forensic Fortifications
- Bootstrapping A Security Research Project
- Building a Security Strategy Without a Security Staff
- Maneuvering Management Madness
- CISOs Guide to Incident Response
- Facilitating Fluffy Forensics
- The Not-So-Improbable Future of Ransomware
- An Introduction to Graph Theory for Security People Who Can’t Math Good
- Fighting Child Exploitation with Oculum
- Why Your Company Needs an Independent Security Advisory Board
- Puppetizing Data Security, Compliance, and Privacy
- APIs for Incident Response
- DIY DNS DFIR: You’re Doing it WRONG
- 15 Years Later: Data Awareness in a Post Robert Hanssen World
- Hello Barbie Forensics
- Are You Raising Your Internet Assets in a Bad Neighborhood?
- Making Lemonade With (Data) Lemons
- The Impact of Ransomware & How to Defend Against It
- Research Into IoT Medical Device Security
- Building Bridges: Forcing Hackers and Business to ‘Hug it Out’
- Overlooked Opportunities and Environmental Epiphanies
- The Five Point Palm Exploding Heart Technique for Forensics
- Unveiling the Open Source Visualization Engine for Busy Hackers