Certified Professionals: Latest Papers

Certified Professionals:

Showing last 50 papers

Analyst Last Name First Name Paper Cert Date
35066 Simsay Jason Is It Patched Or Is It Not? GSEC Apr 23, 2015
2573 Bohio Muhammad Junaid Analyzing a Backdoor/Bot for the MIPS Platform GREM Apr 13, 2015
3029 Sylvander Harri XtremeRAT - When Unicode Breaks GREM Apr 09, 2015
654 Greenwell Matthew Defense-in-Policy begets Defense-in-Depth GCED Apr 03, 2015
35394 Sepe Ryan Denial of Service Deterrence GSEC Apr 01, 2015
524 Hoehl Michael Proposal for standard Cloud Computing Security SLAs - Key Metrics for Safeguarding Confidential Data in the Cloud GLEG Apr 01, 2015
23150 Vedaa Charles Practical El Jefe GCIH Mar 31, 2015
858 Schum Chris Correctly Implementing Forward Secrecy GCIH Mar 30, 2015
10612 Brower Joshua Using Sysmon to Enrich Security Onion's Host-Level Capabilities GCFA Mar 27, 2015
33656 Johnson Josh Finding Evil in the Whitelist GSEC Mar 24, 2015
36190 Jeng Allen Minimizing Damage From J.P. Morgan's Data Breach GSEC Mar 17, 2015
6883 Pubal Jason Web Application Firewalls GCIA Mar 16, 2015
635 Belangia David Data Breach Preparation GLEG Mar 16, 2015
7338 Douglas Mick Powercat GPEN Mar 04, 2015
20328 Mourad Hassan Sleeping Your Way out of the Sandbox GSEC Mar 04, 2015
54 Hartman Kenneth What Every Tech Startup Should Know About Security, Privacy, and Compliance GCCC Feb 25, 2015
6768 Risto Jonathan Exercise - not just for your body anymore GSLC Feb 20, 2015
8591 Khalil George Open Source IDS High Performance Shootout GCIA Feb 17, 2015
1296 Cardinal Steven Monitoring Baselines with Nagios GSNA Feb 12, 2015
9027 Shanks Wylie Enhancing Intrusion Analysis through Data Visualization GCIA Feb 12, 2015
36189 Sass Jeff The Role of Static Analysis in Heartbleed GSEC Feb 12, 2015
9290 Mashburn David NetFlow Collection and Analysis Using NFCAPD, Python, and Splunk GCIA Feb 10, 2015
8038 Ashley Daryl An Analysis of Gameover Zeus Network Traffic GCIA Feb 09, 2015
350 Imbert Courtney Using the PMBoK Framework on Small Business IT Projects GCPM Feb 09, 2015
17828 Young Jason The Integration of Information Security to FDA and GAMP 5 Validation Processes GCIH Feb 05, 2015
23577 D'Herdt Jan Detecting Crypto Currency Mining in Corporate Environments GCIH Feb 04, 2015
6613 Catanoi Maxim Penetration Testing: Alternative to Password Cracking GPEN Feb 02, 2015
8570 Filkins Barbara A Plan for How to Get There and What to Do When You Arrive: Practical Advice on Establishing a Security Information Management Program within Healthcare GSLC Jan 26, 2015
95 Hayden Ernie An Abbreviated History of Automation & Industrial Controls System and Cybersecurity GICSP Jan 26, 2015
13998 Poputa-Clean Paul Automated Defense - Using Threat Intelligence to Augment GCIH Jan 19, 2015
10363 Cain Chris Analyzing Man-in-the-Browser (MITB) Attacks GCFA Jan 12, 2015
15218 Hoehl Michael Cyber Breach Coaching GCIH Jan 12, 2015
35836 Ackerman Paul A No-Budget Approach to Malware Containment GSEC Jan 09, 2015
6684 Panczel Zoltan AIX for penetration testers GPEN Jan 08, 2015
10212 Hosburgh Matthew Leveraging the SCADA Cloud for Fun and Profit GCIA Dec 19, 2014
6419 Thyer Jonathan Let's face it, you are probably compromised. What next? GPEN Dec 15, 2014
8477 Sitnica Adi Energy and Utilities Defense Response based on 2014 Attack Pattern GSLC Dec 11, 2014
383 Hubert Keil Evidence Collection From Social Media Sites GLEG Dec 02, 2014
6078 Vazquez Carlos Auditing using Vulnerability tools to identify today's threats Business Performance GSLC Dec 02, 2014
8456 Hershberger Paul Security Skills Assessment and Training: The Critical Security Control that can make or break all others GSLC Dec 02, 2014
10086 Collyer Tim Faster than a speeding bullet: Geolocation data and account misuse GCIA Dec 01, 2014
34457 Matthee Michael Hendrik Agile defensive perimiters: forming the security test regression pack GSEC Nov 20, 2014
35 Graves Rich Implementing a Shibboleth SSO Infrastructure GWEB Nov 17, 2014
7530 Niemel Mikko Rate my nuke: Bringing the nuclear power plant control room to iPad GSLC Nov 14, 2014
32366 Khalil George Password Security-- Thirty-Five Years Later GSEC Nov 12, 2014
22335 Wen Chinn Yew Secure Design with Exploit Infusion GCIH Nov 11, 2014
8488 Belangia David That's where the Data is! Why Break into the Office of Personnel Management Systems - Because That Is Where the Sensitive Information for Important People Is Maintained! GSLC Nov 04, 2014
34255 Weeks Mike Application White-listing with Bit9 Parity GSEC Oct 29, 2014
35455 Hammarberg David The Best Defenses Against Zero-day Exploits for Various-sized Organizations GSEC Oct 27, 2014
35316 Hosburgh Matthew The Spy with a License to Kill GSEC Oct 24, 2014