Our Information Security Research Contributions
ShmooCon — Windows Projected File System - The Reality Stone
BlackHat Europe — Defending Off The Land
0xcon Security's N-Body Problem
BlueHat India — Tracking illicit phishermen in the deep blue Azure
HackLU — Avoiding The Basilisks Fangs: State-of-the-art In AI LLM Detection
BlueHat — Building a Canarytoken to Monitor Windows Process Execution
ShmooCon — Putting on a BIG SHOW
BSides Cape Town — Home alone isn't scary, it's an INSPIRATION
Hackers Teaching Hackers — Closing Keynote
44CON — More hax0rs should build security products
BSidesKC — Playing games with chimeras
VB2019 — The security products we deserve
USENIX 2019 — Embracing the "hack"
BlackHat 2017 — Fighting the Previous War
T2.fi — Learning the wrong lessons from Offense
BlackHat Europe 2015 — Keynote
BlackHat 2015 — Bring back the Honeypots
Troopers15 — The hard thing about the Hard Things
Hack in the Box — Weapons of Mass Distraction - Sock Puppetry for Fun & Profit
Navixia — Ignore the Politics: Lessons from the Snowden Affair
ITWeb Security — What the Snowden Affair means for South Africa
Acumen — Your company's security posture is probably horrible (but it might be OK)
44Con — A talk about (InfoSec) talks
BlackHat 2013 — The Year in Review
SecData — What should be keeping you up at night
ITWeb Security Summit — The things we don't say
BruCon / Hack in the Box / Troopers — You & Your Research
44Con — Penetration Testing Considered Harmful Today
Paper — On-screen Keyboards Considered Harmful
ZaCon2/ITWeb — Fig Leaf Security
BlackHat USA — Memory Corruption Attacks: The (almost) Complete History
CCDCOE — Conference on Cyber Conflict - Why your threat model is probably wrong
BlackHat USA — Clobbering the Cloud
ISSA — An examination of the Generic Exploit Prevention Mechanisms on Apple's Leopard Operating System
ITWeb Security Summit — One bad Apple
BlackHat USA — Pushing the Camel through the Eye of the Needle
ITWeb Security Summit — When the Rubber hits the Road - Mobile Insecurity
BlackHat USA — Its all about the Timing
ITWeb Security Summit — Drawing Blood from a Stone
ITWeb Security Summit — Thats Really not the Point
BlackHat USA — A Tale of Two Proxies
ITWeb Security Summit — Truth or Scare
ISSA — When good code goes bad!
IDC IT Security Roadshow — The difference between a Duck
RECon — Web Application Hacking
BlackHat USA — When the Tables Turn
Microsoft Tech-Ed — Common Attack Vectors and Protection in IIS6
ISSA — Hacking Web Applications
BlackHat USA — Setiri - Advances in Trojan Technology
Some Things We Have to Build, Even if it's Just for Us
We're Proud to have Contributed to these Information Security Publications
How to Own a Continent
Host & Network Security for Microsoft, UNIX & Oracle
Attacks and Defense
Open Source Toolkit
I’m Mad as Hell, and I’m Not Gonna Take It Anymore!
Second Edition