HEIST: HTTP encrypted information can be stolen through TCP windows
Android Serialization Vulnerabilities Revisited
People-Centric Security: Transform Culture, Reduce Risk, Drive Success
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
SACON Orientation
Application Threat Modeling
ATP Technology Pillars
From Business Architecture to Security Architecture
Practical Enterprise Security Architecture
Integrating Cybersecurity into Supply Chain Risk Management
Super CISO 2020: How to Keep Your Job
The Newest Element of Risk Metrics: Social Media
Enterprise Security Architecture
Attacking SDN infrastructure: Are we ready for the next gen networking
Application Security Architecture and Threat Modelling
Behind the scenes with IOS security
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Hardware Attacks and Security
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Braking the Connected Car: The Future of Vehicle Vulnerabilities