It’s no secret that our computer hard drives contain a lot of things we’d rather keep secret. Because the information security field is my home turf, I’m troubled by some of the loose talk I hear about how to destroy used drives. There is a whole lot of bad advice online, especially.
In the hunt for the next great cybersecurity leaders, are enterprises neglecting an under-tapped source? More women are joining the cybersecurity industry, but there are still myriad opportunities for enterprise security leaders to be advocates and mentors to up-andcoming talent.