Women in IT Security and Their Advocates |
RSAC USA 2017
|
The Underground Economy of Apple ID |
BSidesSF2017
|
Next Generation Endpoint Security--Confused? |
RSAC Abu Dhabi 2016
|
Beware! Zombies are Coming |
VB2016 Denver
|
“$ echo Internet $>_...”: Towards Practical Internet-wide Probing and Crawling |
VB2016 Denver
|
Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators |
Black Hat USA 2016
|
CommSec Track: Exploiting GLIBC: Hacking Everything (CVE-2015-7547) |
HITBSecConf2016 – Amsterdam
|
Guiding Principles to Defending Organizations |
RSAC USA 2016
|
More Books You Should Have Read By Now: The Cybersecurity Canon Project |
RSAC USA 2016
|
The (Inevitable?) Decline of the Digital Age… |
RSAC USA 2016
|