Table of contents
- How to leverage the benefits of open source software in a secure way
- Antivirus 2017: Security with a hint of surveillance
- Evolving PKI for the Internet of Things
- 7 real-world steps to security nirvana
- The HTTPS interception dilemma: Pros and cons
- Deception security doesn’t have to be onerous or expensive
- Report: BSides Ljubljana 0x7E1
- 5 spring cleaning tips for your Identity and Access Management program