Defending the Cloud from the Full Stack Hack
How security changes in the cloud and why you care
DGA Antivenom: Stopping new configurations before analysis
The Bad Guys Have Your Pacemaker: How to Stop Attacks on Your IoT Devices
Toward Consistent, Usable Security Risk Assessment of Medical Devices
Deconstructing The Cyber Kill Chain of Angler Campaign
Emerald City of Cyber Security
httpillage: calling all nodes
Why is Network Access Control So Hard? Is there a Better Way?
Side Channel Defense with Intel Cache Allocation Technique