Media Timeline

2016

Secure Software Distribution in an Adversarial World

MTLS in a Microservices World

Orchestrating Least Privilege

Duo Tech Talks: Secure Software Distribution in an Adversarial World

2015

Green Font, Black Background – Docker Security By Example

Web Summit 2015: Cloud, Open-Source, Security

A Docker Image Walks Into A Notary

From 0 To 0xdeadbeef - Security Mistakes That Will Haunt Your Startup

Forbes: Apple's HomeKit Security Too Demanding

An IDS For Browser Hijacking

Least Privilege Microservices

NY Times: Keeping Your Car Safe From Electronic Thieves

The Register UK: Docker Hires'n'acquires To Cure Its Security Headaches

2014

Local Password Validation Using Self-Organizing Maps

Human Botnet: Scaling Your Security Organization

Crypto-Anchoring: Defending Against Offline Attacks

Multipath TCP: The Path To Multipath

2013

Leveraging Honest Users: Stealth Command-And-Control Of Botnets

ArsTecnica: Engineer Can’t Get Decent Dinner Reservations

Bletchley: Dealing With HSMs So You Don't Have To

WiFiHop - Mitigating The Evil Twin Attack Through Multi-Hop Detection

Observable Non-Sybil Quorums Construction In One-Hop Wireless Ad Hoc Networks

On The Use Of Radio Resource Tests In Wireless Ad Hoc Networks