Author's articles

5 Best Practices and 1 Tool for Mitigating Open-Source Vulnerabilities
By Christine Alexy · 3 years ago
"Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms." – Kevin Mitnick, cybersecurity consultant, ...