Vol 2: 2022–Now

#023 wormhole v2-pq: sending files through a quantum-proof keyhole #022 librings: concentric gates for data that earns its way in #021 the router and the keeper #020 Cinema C2: Hiding a Control Channel Inside a Video File #019 Stonebreaker & Hudson: Mind the Gap #018 2025Q2 Current Projects #017 Stonebreaker & Hudson: Part II, Basil Begins #016 Stonebreaker and Hudson: Part I

Vol 1: 2010–2018

#015 Emerging Cyber Ranges: Competition to Compliance #014 Internet of Everything: Hands-On Cyber Security #013 Threat Intelligence and Baselining #012 Threat Intelligence 101: Introduction and Foundations #011 Threat Intelligence: Neighborhood Watch for Your Networks #010 Taking Control of IT Operations through the Critical Security Controls #009 State of Cyber Security #008 ACM Club Cyber Security Workshop #007 DDoS Survival #006 Cloud Security #005 Java Exploits: Offense and Defense #004 Security on a Shoestring Budget #003 Why Take the Risk? Doing Risk Assessments Right #002 Incident Handling, Forensics and Hacking Techniques #001 ISO Focus+ Article: Plugging Security Gaps