Breaking the Attack Graph: How to Leverage Graphs to Strengthen Security in a Domain Environment |
Black Hat Asia 2018
|
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd |
DEF CON 25
|
Here to stay: Gaining persistency by abusing advanced authentication mechanisms |
DEF CON 25
|