Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Francisco CosioApr 15SMTP SmugglingWhat is SMTP Smuggling? SMTP smuggling involves exploiting vulnerabilities in mail servers to bypass security measures. Attackers...
A. KinghtAug 24, 2016The Bridge on the River FORZAPerforming Digital Forensics According to the FORZA Model and Diamond Model for Intrusion Analysis We can teach these barbarians a lesson...
A. KinghtAug 4, 2016Grapes of Wrath When History Repeats HathHistory Repeats Itself in IT Security "How can we live without our lives? How will we know it's us without our past?” ― John Steinbeck,...
A. KinghtJul 28, 2016Eternal Sunshine of the Spotless Asset Register“Too many guys think I’m a concept, or I complete them, or I’m gonna make them alive. But I’m just a fucked-up girl who’s lookin’ for my...
A. KinghtJul 21, 2016One Flew Over the Cuckoo's TestPenetration Testing with Methodology “All I know is this: nobody’s very big in the first place, and it looks to me like everybody spends...
A. KinghtJul 21, 2016VIDEO: Hacking Connected Cars Through Electronic Control Units and GSM (Presentation by A. Knight)Panel Discussion on Hacking Connected Cars https://www.youtube.com/watch?v=yyCJoNxefeQ
A. KinghtJun 8, 2016Securing the Digital Oil and Gas CompanyAs most oil and gas companies are closely focused on preserving margins to weather the low-price storm, many are also looking ahead and...