Your Quick Guide to Conducting Secure Videoconferences
April 20, 2020
Known issues: what attackers are already looking for The time is ripe for attackers to analyze different videoconferencing solutions for vulnerabilities, analyze them, and exploit them to run their code, gain unauthorized access to corporate infrastructure, and conduct additional malicious activity. So what can you do? How do you do it? The good kind of […]