CRE's Federal Cyber Security Best Practices
Threat Management ArcSight
Emerging cyber threats_report2012
Advanced Presisten Threats conference Mile2
GDS International - CIO - Smmit - Africa - 10
PWC - Global Information Security Survey 2014
Implementing a comprehensive application security progaram - Tawfiq
Information Security Awareness
Облачные технологии в продуктах Лаборатории Касперского
Analysis of Attack on Google: Aurora Botnet Command Structure
Mac OS X Malware: From Myth to Mainstream
Fail 2011: Year of the Hacks