Topics: Vulnerability Analysis
This guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful Coordinated Vulnerability Disclosure process. It also provides insights into how CVD can go awry and how to respond when it does so.
Topics: Pervasive Mobile Computing
This 2016 report provides a snapshot of our current understanding of future technologies.