The Rise of User Circumvention and Risky Unauthorized Activities

15

Author: JT Smith

This podcast discusses how end users are actively skirting IT security controls with anonymous, external proxies and tunneling applications, enabling risky and unauthorized activities.

Link: net-security.org

Category:

  • Security