June 12, 2008

The Rise of User Circumvention and Risky Unauthorized Activities

Author: JT Smith

This podcast discusses how end users are actively skirting IT security controls with anonymous, external proxies and tunneling applications, enabling risky and unauthorized activities.

Link: net-security.org

Category:

  • Security
Click Here!