Spread the love
Month on month we hear about breach after breach.
We hear about what was exposed or stolen, what was ransomed, the widespread impact of DDoS attacks. What doesn’t get covered as frequently is how it is that the exploit took place, what lesson we could learn from the breach, how we could protect ourselves in the future.
Join us as we walk you through the different vectors that these attacks use in their exploits, and the security controls we can use to fight them.
Recorded on Wednesday, February 14, 2018.