Who’s Breaking into Your Garden? iOS and OS X Malware You May or May Not Know |
BSidesSF2016
|
IoT, the Next BYOD—Will We Make the Same Mistakes? |
RSAC Abu Dhabi 2015
|
How malware eats cookies - an empirical study of cookies in malware's communication |
VB2015 Prague
|
Advanced Attacks: How One Exploited Endpoint Leads to Total Datacenter Breach |
RSAC USA 2015
|
More Books You Should Have Read by Now: The Cybersecurity Canon Project |
RSAC USA 2015
|
Powering Your Threat Intel Team with Off-the-Shelf Tools |
RSAC USA 2015
|
The Evolution of the Cybersecurity Executive Trifecta: The CSO/CIO/CISO |
RSAC USA 2015
|
The Power of Pair: One Template that Reveals 100+ UAF IE Vulnerabilities |
Black Hat Europe 2014
|
We know it before you do: predicting malicious domains |
VB2014 Seattle
|
Next Generation Enterprise Security |
RSAC Asia Pacific & Japan 2014
|