Creating a decoy file system

About
Share
Contact
Creating a decoy file system Dr. Marc Stoecklin, principal RSM and manager of cognitive cybersecurity intelligence at IBM Research, tells Tonya Hall how individuals can makes files appear or disappear depending on their identity.

Most Recent

10 macro trends from CES 2019

8:29 / February 20, 2019

CES 2019