The speaker is contemplating whether to leave a hacker logged into a system to avoid missing out on information they need to catch the hacker, or to revoke their access immediately and eliminate the risk of further harm.
GoodListen © 2023
About
Privacy Policy
Terms of service
Support
Blog
Search Podcasts
Podcasts