Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Adiel Lizama 3 days agoData Broker and Privacy DataWhen surfing the Internet, everything we do generates information, from the videos we like, the songs we listen to, the pages we visit,...
A. KinghtJul 28, 2016Eternal Sunshine of the Spotless Asset Register“Too many guys think I’m a concept, or I complete them, or I’m gonna make them alive. But I’m just a fucked-up girl who’s lookin’ for my...
A. KinghtJul 21, 2016One Flew Over the Cuckoo's TestPenetration Testing with Methodology “All I know is this: nobody’s very big in the first place, and it looks to me like everybody spends...
A. KinghtJul 21, 2016VIDEO: Hacking Connected Cars Through Electronic Control Units and GSM (Presentation by A. Knight)Panel Discussion on Hacking Connected Cars https://www.youtube.com/watch?v=yyCJoNxefeQ
A. KinghtJun 8, 2016Securing the Digital Oil and Gas CompanyAs most oil and gas companies are closely focused on preserving margins to weather the low-price storm, many are also looking ahead and...
A. KinghtJun 1, 2016Lock, Stock, and Two Smoking Printers: Hacking and Securing Multifunction PrintersIntroduction “Right. Let’s sort the buyers from the spyers, the needy from the greedy, and those who trust me from the ones who don’t,...
-May 25, 2016Fast and the Curious: Compromising Electronic Control Units (ECUs) in Connected AutomobilesStories from the Garden of Good Versus Evil: Hacking Connected Cars Understanding Electronic Control Units (ECUs) in Connected...