State-Sponsored Cyber-Espionage Attacks
Facial Biometrics for the Security Practitioner
Corporate Security Leadership Strategies: Operationalizing and Sharing Critical Information with the Homeland Security Enterprise.
Protecting and Defending Sensitive Data in the Cloud for the Information Security Professional
Reflections on Cyber Resilience - the Ukrainian Experience