Adversary Profile: Gothic Panda
Penetration Testing in the Cloud
Using NLP to detect phishing and APT CnC domains
Growing Up: A Maturity Model and Roadmap for Vulnerability Management
Embedded Insecurity: Can We Fix The Internet of Evil Things?
Defending the Enterprise with Evernote
Cognitive Injection
Monitoring Social Media in 5 Minutes a Week
Protecting your cloud server with a cloud IDS
Cyber Information Sharing -- A Means, not an End
Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols