"Computer systems today are often built to tolerate failure that arises in normal or benign operations. When sophisticated attackers carefully target the weak points in software systems, they can breach the security of systems with ease. This begs to question: can we design next-generation computer systems to withstand large-scale, co-ordinated security attacks? Bridges can be designed to withstand earthquakes, so why can't computers? Towards this goal, we will showcase recent examples of research pushing the boundaries of computer defenses. These defenses employ rigorous scientific methods at their core, and some of them have transitioned into practical and popularly used systems."