Information Asymmetry and the 1950s Nuclear Bounty
Are you making a Walkman? Or an iPod?
NIST SP 800-53 R5 adds Vulnerability Disclosure Programs to Federal Security and Privacy Controls
DEF CON Black Hat 2020: Top 10 Tips
To err is human - Kerckhoffs' Principle in Software Transparency