Advanced web application hacking and exploitation
Top 10 mistakes running a windows network
Darknet
Ciso back to the future - network vulnerabilities
Implementing and auditing security controls part 1
Java secure development part 2
Java secure development part 3
Firmitas Cyber Solutions - SCADA Cyber-Risk: Fact of Fiction?
Firmitas Cyber Solutions - Mirai Botnet - Basic facts on a world-wide epidemic
Siem & log management
Java secure development part 1
Hacker techniques, exploit and incident handling
Cyber attacks 101
Issa security in a virtual world