A key lesson we have learned is that, in cybersecurity, taking control and maintaining control of a system, from an adversary’s viewpoint, is not that easy, actually. To deny its service, to overwhelm it, is much more easy and can be mounted without much risk of retaliation.

Keyboard shortcuts

j previous speech k next speech