BlueHat 2024: S15: Embedding Sysmon Logs for Enhanced Threat Detection: A Practical Approach to RAG
38:46
BlueHat 2024: S13: Patterns in the Shadows: Scaling Threat Hunting & Intel for Modern Adversaries
31:25
BlueHat 2024: S17: MSTIC - A Threat Intelligence Year in Review
46:16
NODES 2024 Best Of: GraphRAG
43:34
Generative AI Security Top Considerations
53:49
Kubernetes-like Control Planes for Declarative APIs - A Practical Introduction to kcp
37:56
BlueHat 2024: S21: Breaking LLM Apps - Advances in Prompt Injection Exploitation by Johann Rehberger
40:44
BlueHat 2024: S16: Three Decades of Network Security Evolution
46:00