The Edward Snowden revelations have turned Internet security on its head. Now, organizations of all sizes are clamoring to prove they protect end users by implementing the most stringent encryption available: elliptic curve cryptography (ECC). Besides bolstering encryption standards, organizations must contend with other growing threats, like Distributed Denial of Service (DDoS) and web application attacks.
Join Jim Metzler, author and authority on network technology, and Kasey Cross, security evangelist at A10 Networks, to learn the steps you need to take to protect your applications and your network.
Original broadcast: 28 October, 2014