Breaking FIDO: Are Exploits in There?
42:56
Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process
55:24
FIDO2 – Creating a passwordless future
16:01
Yubikey: This Simple USB key Protects Everyone From Phishing
1:04:22
Beyond Passwords: Simpler, Stronger Authentication with FIDO2
50:29
Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency
26:28
WebAuthn 101 - Demystifying WebAuthn
40:08
Web Application Firewalls: Analysis of Detection Logic
52:32