Report copyright - IT Evolution & Revolutionstaff.washington.edu/gray/talks/2010/IT-Evo.pdf35 Security Changing threat vectors Shifting to social engineering (hard to stop) Malware more sophisticated;
Please pass captcha verification before submit form