Identifying Malicious Activities during Mergers

3 minutes, 11 seconds


Right click “Save as…”

So you're firm is going through a merger. Are you prepared to connect their potentially compromised network to yours? And what if your network is the one that's infected?


Follow the discussion

  • Oops, something didn't work.

    Getting subscription
    Subscribe to this conversation

No comments

Sorry, no comments have been submitted yet.

Please make a comment below or check back later.

Comment on the post

Already have a Channel 9 account? Please sign in