Hackers Interrupted
Remembering how we got here Integrating defense-in-depth into DevOps Culture
Security in the land of Microservices
How to Dystopia Proof your Data
JavaScrypto: How we are using browsers as cryptographic engines
Kill all the Orcs, Hack all the things
Threat Hunting for Enterprise
Murder mystery, How Vulnerable Intelligence is Poising your infosec program
Need for Speed, Benefits of speed driven incident response