Security ArchitectureEavesdropping on enterprise appsGavin HillOctober 15, 2013It's surprisingly easy for an attacker to set up a rogue wireless access point with open access and perform a MiTM attack, gaining access to a wealth of sensitive information.
Network SecurityLessons learned from SnowdenGavin HillAugust 12, 2013There are lessons to be learned from the Edward Snowden incident to create a strong sense of trust within an organization's network.