The Lazy Programmer’s Guide to Secure Computing

In this
Google TechTalk, HP’s Marc Stiegler describes a different approach to
security software.

In this
Google TechTalk, HP’s Marc Stiegler describes a different approach to
security software.

Suggested articles

Discussion

  • Calandale on

    Looks as though the transcription was automatically done.

    ex: 'purse protocol' as FIRST protocol.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.