The Rise of User Circumvention and Risky Unauthorized Activities
In the new edition of the HNS podcast, Chris King from Palo Alto Networks discusses user circumvention – how end users are actively skirting IT security controls with anonymous, external proxies and tunneling applications, enabling risky and unauthorized activities.