Attackers have no need of zero-days, breach data shows

Cyber attackers do not have to use previously unseen or extremely sophisticated attacks to bypass defences, analysis of publicly reported breaches in the past year reveals

Most successful cyber attacks are possible because organisations are not doing a good job of protecting their systems, according to Dave Lewis, global security advocate at Akamai Technologies.

Click here to view original web page


Your e-mail address will not be published.
Required fields are marked*