Facial Biometrics for the Security Practitioner
State-Sponsored Cyber-Espionage Attacks
From Pixels to Insights: Maximizing the Value of Video Data in Security Operations
Reflections on Cyber Resilience - the Ukrainian Experience
Protecting and Defending Sensitive Data in the Cloud for the Information Security Professional