BYOD: Bring Your Own... Disaster?
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Information Security
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de Threat Intelligence