A security professional needed a secure language for IoT development. So he wrote his own, applying learned lessons about memory and resources in the process.
These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields.
In this webinar, you will learn how a simple shift to an adversary-focused approach will help stop targeted threats and will evolve your security program from lean-back to lean-forward -- no matter the size or maturity of your security team.
In this Dark Reading webinar, experts discuss methods for using network segmentation and microsegmentation as part of your organization's strategy for limiting the effects of an online compromise.
We are seeking your input for an important survey about the role of the IT security or the cybersecurity professional. Participate and get a chance to enter a drawing for 1 of 10 $50 Amazon gift cards.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.