Honeypots 2.0: A New ‘Twist’ on Defending Enterprise Networks with Dynamic Deception at Scale |
BSidesSF2018
|
Security Bulletins on Trial: Are Vendors Guilty of Information Obscurity? |
RSAC USA 2017
|
Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time? |
RSAC USA 2017
|
Dreaming of IoCs: Adding Time Context to Threat Intelligence |
RSAC USA 2016
|
Fuzz Smarter, Not Harder (An afl-fuzz Primer) |
BSidesSF2016
|
Sweet Security: Deploying a Defensive Raspberry Pi |
BSidesSF2016
|
My Bro the ELK: Obtaining Context from Security Events |
Black Hat USA 2015
|
Killing the Kill Chain: Disrupting the Cyber Attack Progression |
RSAC USA 2015
|
Vulnerability and Risk Scoring: What Ratings Really Mean |
RSAC USA 2015
|
Restoring Trust After a Data Breach |
RSAC Asia Pacific & Japan 2014
|