Defend Security Vulnerabilities
It’s common to find exploits used as part of cyber attacks: upwards of 90%
of reported data breaches find that an exploit is used at one or more points
in the attack chain. Including exploit prevention as part of a comprehensive
lineup of security defenses is clearly valuable.
Topics in Discussion:
- How exploits work
- Methods for mitigation