Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Mitigating the Alert - Impact Prevention in a super active security battlefield
Confessions of a Professional Cyber Stalker
UNMASKING MALWARE
Making & Breaking Machine Learning Anomaly Detectors in Real Life
Stealthier Attacks and Smarter Defending with TLS Fingerprinting
SIEM and the Art of Log Management
Software Defined Networking / Attacker Defined Networking
Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities