Index of /rsaconference/europe-2012/
../
10-Reasons-Not-to-Virtualize-The-Security-Persp..> 31-Jul-2013 00:40 1310127
7-Highly-Effective-Habits-of-a-Security-Awarene..> 31-Jul-2013 00:42 341921
A-Flexible-and-Comprehensive-Approach-to-a-Clou..> 31-Jul-2013 00:30 2571477
Active-Defence-How-to-Counter-Your-Attackers.pdf 30-Jul-2013 17:47 1327599
Adversary-ROI-Evaluating-Security-from-the-Thre..> 30-Jul-2013 16:02 2020204
Are-We-Getting-Better-Why-We-Do-not-Know-What-W..> 30-Jul-2013 21:08 2169619
Big-Data-Big-Threat-or-Big-Opportunity-for-Secu..> 30-Jul-2013 21:06 682113
Breaking-the-Failure-Cycle-Why-Breaches-from-Kn..> 31-Jul-2013 00:37 6529188
Cases-of-JavaScript-Misuse-and-How-to-Avoid-The..> 30-Jul-2013 02:38 3961655
Cloud-Provider-Assurance.pdf 30-Jul-2013 16:01 1461239
Cloud-Provisioning-and-Security-Using-Oauth2-an..> 30-Jul-2013 20:40 403376
Conflicting-Visions-of-Cloud-Identity.pdf 30-Jul-2013 20:58 1432846
Cracked-SSL.pdf 31-Jul-2013 00:36 248194
Csirt-Cyber-Extortion-Ddos-Attacks-Forensics.pdf 30-Jul-2013 17:45 1101108
Customisable-Security-Leveraging-Big-Data-for-M..> 30-Jul-2013 21:15 1614859
Cyber-Crime-Easy-as-Pie-and-Damn-Ingenious.pdf 30-Jul-2013 16:10 9236944
Cyber-Jihad-vs-Cyberterrorism-Separating-Hype-F..> 30-Jul-2013 17:49 1588094
Dealing-with-Big-Data-in-Cyber-Intelligence.pdf 30-Jul-2013 17:48 1799845
Deceiving-Permissions-Rules-for-Android-Malware..> 30-Jul-2013 21:12 1208973
Defending-Behind-the-Device-Mobile-Application-..> 30-Jul-2013 21:13 3471436
Developing-Secure-Software-in-the-Age-of-Advanc..> 15-Jul-2013 22:52 1584149
Dissecting-Advanced-Targeted-Attacks-Separating..> 31-Jul-2013 00:35 2035360
Duqu-Flame-Gauss-Followers-of-Stuxnet.pdf 30-Jul-2013 14:29 1057511
Encryption-for-Clouds.pdf 30-Jul-2013 14:35 2847658
Entitlement-And-Why-Identity-Needs-to-be-About-..> 30-Jul-2013 20:51 2683278
Flipit-A-Game-Theory-Handle-on-Password-Reset-a..> 30-Jul-2013 20:44 1094599
Full-Employment-Good-or-Bad-News-for-the-Inform..> 30-Jul-2013 21:37 1997143
Games-of-Keys-and-Clouds-Finding-a-Nash-Equilib..> 31-Jul-2013 00:44 1535488
Good-Guys-vs-the-Bad-Guys-Can-Big-Data-Tools-Co..> 31-Jul-2013 00:33 2306785
Hacking-Senior-Management-Selling-Security-to-t..> 30-Jul-2013 21:39 2540188
Hacking-the-Virtual-World.pdf 30-Jul-2013 20:32 1447526
How-SCIM-Simplifies-Migration-to-Cloud-Services..> 30-Jul-2013 20:33 640233
How-To-Rob-An-Online-Bank-And-Get-Away-With-It.pdf 30-Jul-2013 16:08 817074
How-to-Build-a-Cyber-Intelligence-Capability.pdf 31-Jul-2013 00:45 4589836
How-to-Grow-and-Transform-Your-Risk-and-Securit..> 31-Jul-2013 00:31 1328596
How-to-Set-Up-Integrated-Security-Governance-Pr..> 30-Jul-2013 15:58 664366
Implementing-an-Intelligent-SOC.pdf 31-Jul-2013 00:32 868569
Intelligence-Driven-Security-In-Action.pdf 30-Jul-2013 21:03 3139887
Intelligence-Driven-Security-The-New-Model.pdf 30-Jul-2013 21:03 1630664
Mastering-Security-in-Agile-Scrum-Case-Study.pdf 30-Jul-2013 02:31 829511
Me-and-My-Digital-Shadow-Protecting-and-Detecti..> 31-Jul-2013 00:41 2342740
Microsoft-Security-Intelligence-Report.pdf 30-Jul-2013 14:34 5448643
No-Followers-No-Botnet-No-Problem-Asymmetric-De..> 30-Jul-2013 16:08 937726
Opening-the-Kimono-Automating-Behavioural-Analy..> 30-Jul-2013 21:09 3426337
Poortego-An-OS-INT-correlation-tool-for-the-99.pdf 30-Jul-2013 14:30 1193392
Practical-Security-Risk-Management-Strategies-i..> 30-Jul-2013 16:03 1679459
Privacy-by-Design-From-Theory-to-Practice.pdf 30-Jul-2013 14:33 286712
Privacy-by-Design-Security-by-Design.pdf 30-Jul-2013 21:32 233522
Protecting-Your-Data-on-Mobile-Devices.pdf 30-Jul-2013 14:31 1151001
README.txt 16-Feb-2015 04:13 80
Risks-and-Rewards-in-Cloud-Adoption.pdf 30-Jul-2013 21:04 952632
SSL-and-Browser-Security-Why-is-it-Such-an-Uphi..> 30-Jul-2013 20:30 1826354
Securing-Big-Data-Learning-and-Differences-from..> 30-Jul-2013 14:32 1277157
Securing-the-Supply-Chain-Guide-to-Risk-Managem..> 30-Jul-2013 15:56 615573
Security-Implications-of-the-Internet-Transitio..> 30-Jul-2013 02:35 1853086
Smartphone-Security-Winners-Losers.pdf 30-Jul-2013 21:14 2992458
Step-into-the-Future-HTML5-and-its-Impact-on-SS..> 31-Jul-2013 00:36 766275
Surviving-as-a-CISO-in-a-World-of-Zombie-Audito..> 30-Jul-2013 16:06 1790140
Testing-Darwinism-The-History-and-Evolution-of-..> 31-Jul-2013 00:34 1396438
The-Future-of-Cloud-Identity-Security.pdf 30-Jul-2013 20:50 788247
The-Growing-Threat-of-Embedded-Hacking.pdf 30-Jul-2013 20:28 1713686
The-Legal-Attack-Vector-How-To-Protect-Yourself..> 30-Jul-2013 21:31 654822
The-Mobile-Criminal-A-Pocket-Full-of-Maliciousn..> 30-Jul-2013 21:08 2864467
The-Mobile-Enterprise-7-Strategies-to-Manage-Ri..> 30-Jul-2013 21:11 372725
The-XX-Factor-Why-Women-are-Key-to-the-Future-o..> 30-Jul-2013 21:38 329438
They-are-Inside-Now-What.pdf 30-Jul-2013 17:44 2017947
Training-Employees-to-Recognise-and-Avoid-Advan..> 31-Jul-2013 00:43 2528365
Using-Security-Intelligence-to-Stay-Out-of-the-..> 30-Jul-2013 14:37 1974550
Using-Social-Engineering-Tactics-for-Big-Data-E..> 30-Jul-2013 14:36 841750
Ways-To-Interpret-Security-Standards-What-We-Ca..> 30-Jul-2013 15:57 1315573
What-the-Security-Profession-Can-Learn-From-the..> 30-Jul-2013 17:43 322496