It’s all about it, nothing else!
The IoT and cybersecurity landscape
How to secure-by-design
The anatomy of remote attacks
#1 The identification phase
#2 The exploitation phase
Off-the-shelf products for Security-by-design
A wonderful serenity has taken possession of my entire soul, like these sweet.
Components off-the-shelf for the Trusted Computing Base