Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Adiel Lizama 6 days agoData Broker and Privacy DataWhen surfing the Internet, everything we do generates information, from the videos we like, the songs we listen to, the pages we visit,...
A. KinghtJun 15, 2018The Hitchhiker's Guide to Hacking Connected Cars: ECUs Demystified“Tell me and I forget, teach me and I may remember, involve me and I learn.” ― Benjamin Franklin History of Electronic Control Units In...
A. KinghtApr 17, 2018All the Kings Men: Implementing The Castle Approach in Information Assurance Upside Down"I like to turn things upside down, to watch pictures and situations from another perspective." -Ursus Wehrli Two decades ago, companies...
A. KinghtApr 13, 2018Threat Modeling and Performing Risk Assessments Against Connected CarsWatch my keynote presentation at the Vehicle Electronics and Connected Services 2018 conference in Gothenburg, Sweden on YouTube at...
A. KinghtMar 10, 2018Teaser from my new book on Hacking Connected Cars: Testing LocationsOne of the paramount contributors to our success in our Connected Car Division at my firm, Brier & Thorn, has been our willingness to...
A. KinghtMar 8, 2018New personal homepage, book site, and Personal 2017 Year in Review videoAnnouncing the launch of my new homepage and personal 2017 Year in Review video.
A. KinghtNov 6, 2017The Hitchhiker's Guide To Hacking Connected Cars: Methodology and Jump Kit Readiness“Abashed the devil stood and felt how awful goodness is and saw Virtue in her shape how lovely: and pined his loss” ― John...