Our Information Security Research Contributions
VB2019 - The security products we deserve
USENIX 2019 - Embracing the "hack"
BlackHat 2017 - Fighting the Previous War
T2.fi - Learning the wrong lessons from Offense
BlackHat Europe 2015 - Keynote
BlackHat 2015 - Bring back the Honeypots
Troopers15 - The hard thing about the Hard Things
Hack in the Box - Weapons of Mass Distraction - Sock Puppetry for Fun & Profit
Navixia - Ignore the Politics: Lessons from the Snowden Affair
ITWeb Security - What the Snowden Affair means for South Africa
Acumen - Your company's security posture is probably horrible (but it might be OK)
44Con - A talk about (InfoSec) talks
BlackHat - 2013 - The Year in Review
SecData - What should be keeping you up at night
ITWeb Security Summit - The things we don't say
BruCon / Hack in the Box / Troopers - You & Your Research
44Con - Penetration Testing Considered Harmful Today
Paper - On-screen Keyboards Considered Harmful
ZaCon2/ITWeb - Fig Leaf Security
BlackHat USA - Memory Corruption Attacks: The (almost) Complete History
CCDCOE - Conference on Cyber Conflict - Why your threat model is probably wrong
BlackHat USA - Clobbering the Cloud
ISSA - An examination of the Generic Exploit Prevention Mechanisms on Apples Leopard Operating System
ITWeb Security Summit - One bad Apple
BlackHat USA - Pushing the Camel through the Eye of the Needle
ITWeb Security Summit - When the Rubber hits the Road - Mobile Insecurity
BlackHat USA - Its all about the Timing
ITWeb Security Summit - Drawing Blood from a Stone
ITWeb Security Summit - Thats Really not the Point
BlackHat USA - A Tale of Two Proxies
ITWeb Security Summit - Truth or Scare
ISSA - When good code goes bad!
IDC IT Security Roadshow - The difference between a Duck
RECon - Web Application Hacking
BlackHat USA - When the Tables Turn
Microsoft Tech-Ed - Common Attack Vectors and Protection in IIS6
ISSA - Hacking Web Applications
BlackHat USA - Setiri - Advances in Trojan Technology
Some Things We Have to Build, Even if it's Just for Us
We're Proud to have Contributed to these Information Security Publications
How to Own a Continent
Host & Network Security for Microsoft, UNIX & Oracle
Attacks and Defense
Open Source Toolkit
I’m Mad as Hell, and I’m Not Gonna Take It Anymore!
Second Edition