Operation get rich or die tryin' : how the TJX breach set the stage for a decade of payment card conflict --
"What they aren't telling you is their rules are archaic" : the South Carolina Department of Revenue breach, IRS fraud and identity theft --
The most wanted cybercriminal in the world : GameOver ZeuS, Cryptolocker, and the rise of ransomware --
Certificates gone rogue : the DigiNotar compromise and the Internet's fragile trust infrastructure --
No doubt to hack you, writed by UglyGorilla : China's PLA Unit 61398 and economic espionage --
"Decades in the making" : the Office of Personnel Management breach and political espionage --
Operation Stophaus : the Spamhaus denial-of-service attacks --
"An epic nightmare" : the Sony breach and ex-post mitigation --
Imperfect affair : Ashley Madison and the economics of embarrassment --
"Email the way it should be" : the role of application designers and software developers --
Reasonable security : the role of organizations in protecting their data and networks --
"Happy talk about good ideas" : the role of policy makers in defending computer systems --