Author: JT Smith
This podcast discusses how end users are actively skirting IT security controls with anonymous, external proxies and tunneling applications, enabling risky and unauthorized activities.
Link: net-security.org
Category:
- Security
Author: JT Smith
Link: net-security.org
Category: