Change told by the numbers

“Cybersecurity professionals need new tricks to sort the hidden bad actors . . . One tool that could reveal these hidden threats is the use of entropy.”
-Shyam S. Ramaswami
Security Researcher, Cisco

Key takeaways
The world is changing, threats are changing, and you should be changing too.