Meet the man-in-the-middle of your next security crisis
If he’s the man-in-the-middle, why are you stuck between a rock and a hard place?
Sourced through Scoop.it from: www.cio.com
The strongest protection is adding point-2-point encryption in the applications themselves. When the session gets intercepted, or a similar man-in-the-middle, the data will still be safe, from the sender to the recipient.