Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware A Journey to Protect Points of Sale (POS) Man in the Browser attacks on online banking transactions New realities in aviation security remotely gaining control of aircraft systems New realities in aviation security remotely gaining control of aircraft systems Insecurity in security products 2013
Why current security solutions fail Anatomy of business logic vulnerabilities
Using 80 20 rule in application security management Top Application Security Trends of 2012
Vulnerability in Security Products
Insecurity in security products v1.5