扫一扫安装书房APP
扫一扫关注微信号
the-strategic-advantage-of-adaptive-multi-engine-advanced-threat-protection
pitching-infosec-in-the-boardroom-when-your-customers-dont-care
the-finance-sector-and-countering-cyber-threat-lessons-from-the-front-lines
security-leadership-lessons-from_the-dark-side
no-more-security-empires_the-ciso-as-an-individual-contributor
maximum-security-with-minimum-impact-going-beyond-next-gen
vendor-ecurity-alliance-finally-fixing-third-party-cybersecurity
how_to_do_security_with_your_organization-_not_to_it
a-sustainable-strategy-for-critical-infrastructures-and-key-resources
security-bulletins-on-trial-are-vendors-guilty-of-information-obscurity
the-human-exploitation-kill-chain
applied-cognitive-security-complementing-the-security-analyst
could-us-hacking-laws-handicap-cybersecurity
ciso-as-change-agent-getting-to-yes
applying-ooda-and-feedback-loops-to-security-processes
how-nation-states-and-criminal-syndicates-use-exploits-to-bypass-security
automated-prevention-of-ransomware-with-machine-learning-and-gpos
how-leaders-of-tomorrow-attack-security-problems-holistically-and-head-on
toward-distributed-and-virtualized-enterprise-security
the-internet-of-attacking-things
what_cisos_wish_they_could_say_out_loud