Blitzkrieg, the IT equivalent of a Stealth fighter, detects hackers and responds by setting up a counter-attack. However, as Davey Winder explains, it may be breaking the law in the same way that hackers do.
Described as being a self-programmed, fault-immune, ubiquitousckers and responds by setting up a counter-attack. However, as Davey Winder explains, it may be breaking the law in the same way that h...
To continue reading this article...
Join Computing
- Unlimited access to real-time news, analysis and opinion from the technology industry
- Receive important and breaking news in our daily newsletter
- Be the first to hear about our events and awards programmes
- Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
- Access to the Computing Delta hub providing market intelligence and research
- Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders