Jump to content

Recommended Posts

Posted

The conferences will dig into issues ranging from mobile malware and hacking to vulnerabilities posed by linking critical infrastructure systems to the Internet and corporate networks. There are bound to be some hijinks as well.

 

View the full article here. Discuss it here or chat about it in #koachsworkshop here!

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...