Bill Hardin will be a panelist on extortion during this conference. This session looks at how the motivations of cyber attackers are changing and addresses some of the tools needed to identify extortion crimes such as ransomware and hacktivism, as well as best practices that companies can implement and use to prevent this type of attack.
For more information, click here.
“Bug bounty” demands: legal bane or information security boon?
A “bug bounty” request occurs when a self-described security researcher contacts a company, claiming to have discovered an information security vulnerability,...