Joe Slowik, profile picture

Joe Slowik

Sort by
The Convergence of Threat Behaviors Across Intrusions
The Disclosure Dilemma - Ensuring Defense
Understanding Indicators
Burrowing Through The Network - Contextualizing The Vulkan Leaks
Assessing the Balance Between Visibility & Confidentiality in ICS Network Traffic
Thrice Is Nice: Ukraine In Review
Cyber consequences, operational dependencies, and full scope security
Mission kill process targeting in ics attacks
Full-Spectrum Information Operations for Critical Infrastructure Attacks
Past and future of integrity based attacks in ics environments
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
EASE spectre meltdown_support
SANS DFIR Prague: PowerShell & WMI