2016
Secure Software Distribution in an Adversarial World
![](https://blog.diogomonica.com/content/images/2016/11/Ckg_Ej7WsAAVXv2.jpg)
MTLS in a Microservices World
![](https://blog.diogomonica.com/content/images/2016/11/Screenshot-2016-11-19-19.03.27-1.png)
Orchestrating Least Privilege
![](https://blog.diogomonica.com/content/images/2016/11/Screenshot-2016-11-20-10.48.08.png)
Duo Tech Talks: Secure Software Distribution in an Adversarial World
![](https://blog.diogomonica.com/content/images/2016/11/Screenshot-2016-11-20-11.08.39.png)
2015
Green Font, Black Background – Docker Security By Example
![](https://blog.diogomonica.com/content/images/2016/08/security_by_example.png)
Web Summit 2015: Cloud, Open-Source, Security
![](https://blog.diogomonica.com/content/images/2016/08/cloud_opensource_security.png)
A Docker Image Walks Into A Notary
![](https://blog.diogomonica.com/content/images/2016/08/notary.png)
From 0 To 0xdeadbeef - Security Mistakes That Will Haunt Your Startup
![](https://blog.diogomonica.com/content/images/2016/08/deadbeef.png)
Forbes: Apple's HomeKit Security Too Demanding
![](https://blog.diogomonica.com/content/images/2016/08/homekit.png)
An IDS For Browser Hijacking
![](https://blog.diogomonica.com/content/images/2016/08/browserids.png)
Least Privilege Microservices
![](https://blog.diogomonica.com/content/images/2016/08/leastprivilege.png)
NY Times: Keeping Your Car Safe From Electronic Thieves
![](https://blog.diogomonica.com/content/images/2016/08/nytimescars.jpg)
The Register UK: Docker Hires'n'acquires To Cure Its Security Headaches
![](https://blog.diogomonica.com/content/images/2016/08/hiresnacquires.jpg)
2014
Local Password Validation Using Self-Organizing Maps
![](https://blog.diogomonica.com/content/images/2016/08/soms.png)
Human Botnet: Scaling Your Security Organization
![](https://blog.diogomonica.com/content/images/2016/08/humanbotnet.png)
Crypto-Anchoring: Defending Against Offline Attacks
![](https://blog.diogomonica.com/content/images/2016/08/cryptoanchors.png)
Multipath TCP: The Path To Multipath
![](https://blog.diogomonica.com/content/images/2016/08/mptcp.png)
2013
Leveraging Honest Users: Stealth Command-And-Control Of Botnets
![](https://blog.diogomonica.com/content/images/2016/08/botnets.png)
ArsTecnica: Engineer Can’t Get Decent Dinner Reservations
![](https://blog.diogomonica.com/content/images/2016/08/arstecnicabots.jpg)
Bletchley: Dealing With HSMs So You Don't Have To
![](https://blog.diogomonica.com/content/images/2016/08/bletchley.png)
WiFiHop - Mitigating The Evil Twin Attack Through Multi-Hop Detection
![](https://blog.diogomonica.com/content/images/2016/08/wifihop.png)
Observable Non-Sybil Quorums Construction In One-Hop Wireless Ad Hoc Networks
![](https://blog.diogomonica.com/content/images/2016/08/quorums.png)
On The Use Of Radio Resource Tests In Wireless Ad Hoc Networks
![](https://blog.diogomonica.com/content/images/2016/08/rrt.png)