Blog :: Security Operations

SharePoint vulnerabilities: using metadata to verify traffic

jimd