In case you missed it, here's the jam-packed webcast that took place this week with three of the data security industry's leading authorities. Watch below and try not to nerd out too hard.
Some people have nothing better to do than to seek and exploit the weakness of others. Such is the life of a hacker, but instead of people, they infiltrate a computer system or network. Let’s take a moment to examine the history of hackers and their role in shaping data security.