IDG Contributor Network: The Darwin defense: can ‘genetic algorithms’ outsmart malware?

Michelle Drolet

You have access to this text at CSO Online Information Security https://www.csoonline.com/article/3237671/malware/the-darwin-defense-can-genetic-algorithms-outsmart-malware.html#tk.rss_dataprotection

Advertisements

IDG Contributor Network: Biometrics and blockchains: the Horcrux protocol [part 3]

John Callahan

You have access to this text at CSO Online Information Security https://www.csoonline.com/article/3237685/identity-management/biometrics-and-blockchains-the-horcrux-protocol-part-3.html#tk.rss_dataprotection

IDG Contributor Network: Rethinking response: the benefits of seeking external support

Chris Camacho

You have access to this text at CSO Online Information Security https://www.csoonline.com/article/3237545/data-breach/rethinking-response-the-benefits-of-seeking-external-support.html#tk.rss_dataprotection