-
We're Doing It All Wrong:
Why We Need To Change Our Approach To Cyber Security
- Chris Ulliott
-
Emerging Threats, Hackers And Attackers:
Stories From The SOC
- Dan Pitman
-
Data Appropriation Through Organisation Infiltration
Using Enhanced Integration And Truth Manipulation
- Tom Farrant and Sash Rigby
-
Exposing Internet Protocol Theft
- Gaith Taha
-
People: The Strongest Link
- Emma W
-
Profiling The Attacker:
Using Natural Language Processing To Predict Crime
- James Stevenson
-
Cloud Security 1984
- Andi Hudson
-
Bad Web Applications:
Security Architecture And Pen Testing Horrors
- Martin Pill
-
Irresponsible Disclosure
- Dylan Wheeler
-
Security Enablement
- Sean Wright
-
iOS Apps Hacking Just Got Easier
- Tomer Hadad
-
Heimdal Kerberos Authentication
And Kerberos Attack Surface
- Sadi Zane
-
Common Mistakes And Getting The Basics Right
- Nic Miller
-
Protecting £637 Billion Every Day: How The BofE
Has Evolved From A Reactive To A Proactive SOC
- Jonathan Pagett
-
IoT From An Attacker's Perspective
- Venkata Hareesh Peddiraju
-
Threat Hunting:
The Difference Between Safe And Sorry
- Dan Pitman
-
Statistical Security For IoT
- Abia Amin
-
Ghidra Vs The Cold War
- Chris A
-
MITRE ATT&CK Framework For Threat Hunting
- Seth Brunt and Abby Warnes
-
Rise Of The Blue Team CTFs
- Russ Taylor
-
Spotting The Adversary Using The
ATT&CK Matrix: A Practical Approach
- Pete O
-
From Bedroom To Boardroom: How To Turn The Idea
You Had At 1 AM Into A Multi-Million Turnover Business
- Nicola Whiting
-
Logging Made Easy
- Shane M
-
Reverse Engineering For Threat Intelligence
- Vishal Thakur
-
Pi$$ing Off An APT
- Ed Williams
-
Making It Rain: Cryptojacking Attacks In The Cloud
- Chris Doman
-
Voodoo People
- David Hartley