
Cellular Cryptography
In this presentation, I explore how Authentication and Authorization takes place on LTE Cellular Networks, as well as AS and NAS cryptography.
In this presentation, I explore how Authentication and Authorization takes place on LTE Cellular Networks, as well as AS and NAS cryptography.
Operating Systems offer unique insights into how to write complex software securely. In this presentation, I look at how different security-focused operating systems approach security, and take a...
This week, we investigate how the world wide web works, and how you can both attack and defend websites. Key Take Aways * Trust and validate inputs on the...
95% of cyber attacks involve user error. How can we break resistance and drive meaningful long-term change? Key Take Aways * By separating changes into small steps, we can...
The Evolved Packet System (EPS) is one of the most transformative technologies developed within my lifetime. It was in response to, but also enabled, the rise of internet-first...