Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security

Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime

Identity theft 2.0: New strategies and how organisations can respond