Technical Papers
Technical Papers
A treatise on cryptography and the questions information security still grapples with regarding the ethical and safe use of technology.
Methods of decrypting encrypted traffic for inspection raise concerns around privacy and ethics. Techniques include man-in-the-middle attacks, SSL inspection, TLS proxies/intercept, and network forensics.
A candid discussion about the benefits of Intel for internal security testing and ongoing programs.
A candid discussion about the benefits of Intel for internal security testing and ongoing programs.
Original research into artificial intelligence, tools, and techniques. GPL attribution licensed.
AI is changing the landscape of information security. What does this mean to the information security profession? GPL attribution licensed.
Smart contracts are, in the opinion of the author, a ticking timebomb in regards to security implications. This paper gives a brief view into where additional research should take place to thoroughly understand the risk. GPL attribution license.
A primer on the basics in starting a red team program, and the desired outputs of the project. GPL attribution license.
This paper explores the security capabilties from a Amazon product perspective, along with select third party products and competitors. GPL attribution licensed.
This paper explores the security capabilities from a Google product perspective, along with select third party products and competitors. GPL attribution licensed.