Creating a decoy file system

About
Share
Contact
Creating a decoy file system Dr. Marc Stoecklin, principal RSM and manager of cognitive cybersecurity intelligence at IBM Research, tells Tonya Hall how individuals can makes files appear or disappear depending on their identity.

Most Recent