top of page

Road Warriors: Beware of ‘Video Jacking’

This is yet another attack vector for which to consider and prepare.  Displays have become multi-function devices, so it is that much more difficult to identify and monitor for tampering.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page