In defense of cyberwar
Domino testing presentation
Password policies
Effective user training
Big security for big data
Csrf not all defenses are created equal