Moby SIG Orchestration Security Summit Presentation Cloud conf keynote - Orchestrating Least Privilege MTLS in a Microservices World Secure Software Distribution in an Adversarial World Web Summit 2015 - Enterprise stage - Cloud, Open-Source, Security An IDS for browser hijacking From 0 to 0xdeadbeef - security mistakes that will haunt your startup ESORICS 2014: Local Password validation using Self-Organizing Maps Leveraging Honest Users: Stealth Command-and-Control of Botnets Observable Non-Sybil Quorums Construction in One-Hop Wireless Ad Hoc Networks WiFiHop - mitigating the Evil twin attack through multi-hop detection On the use of radio resource tests in wireless ad hoc networks MultiPath TCP - The path to multipath