A long-overdue change
Women bring new skill sets, but early encouragement, training in grade school and mentoring are all needed to succeed, reports James Hale.
This month's threat stats look into U.S. and international hackers' attack preferences. U.S. attackers favor the Allaple.A worm, whereas foreign hackers often harness the Zero Access trojan.
The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.
This year's annual event in New York City welcomed security leaders from various sectors to speak about hot topics including BYOD, cloud security, and DDoS attacks.