Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs |
RSAC Abu Dhabi 2016
|
Harnessing Intel Processor Trace on Windows for Vulnerability Discovery |
BlueHat v16
|
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic |
WOOT '16
|
HTTP/2 & QUIC - Teaching Good Protocols To Do Bad Things |
Black Hat USA 2016
|
Extending Your Security beyond Traditional Safe Borders with OpenDNS |
RSAC Asia Pacific & Japan 2016
|
10 Easy Steps to Building a Successful Extended Security Team |
RSAC USA 2016
|
Privacy, Security, IT and the New European General Protection Regulation |
RSAC USA 2016
|
Automating Linux Malware Analysis Using Limon Sandbox |
Black Hat Europe 2015
|
Cisco’s Security Dojo: Raising the Application Security Awareness of 20,000+ |
AppSec USA 2015
|
Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core |
DEF CON 23
|