/wp-content/uploads/2023/05/Screenshot-2023-05-17-at-9.20.48-AM.png9801832Wade Baker/wp-content/uploads/[email protected]Wade Baker2023-05-25 12:15:502023-05-26 17:05:25Visualizing the Value of Attack Path Choke Points for Prioritization
/wp-content/uploads/IRIS-Tsunami-cover-1.png18481428John Sturgis/wp-content/uploads/[email protected]John Sturgis2021-10-26 09:24:352022-06-14 12:47:36IRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents
/wp-content/uploads/elevate-training-org.png5861076Wade Baker/wp-content/uploads/[email protected]Wade Baker2021-06-28 09:40:532022-06-14 15:58:02Salving Human Risk in Cybersecurity
/wp-content/uploads/p2pv6fig21.png12362046Wade Baker/wp-content/uploads/[email protected]Wade Baker2021-01-21 08:00:222022-06-14 16:05:36I Once Called Vuln Researchers NVPs; Are They MVPs Instead?
/wp-content/uploads/soss11-fig16.png11141794Wade Baker/wp-content/uploads/[email protected]Wade Baker2020-12-10 12:00:532022-06-14 16:12:26What Matters More in Software Security - Nature or Nurture?