-
Zero-day attacks: Protections, best practices and how to implement them
- April 9, 2020
- Posted by: Edem Glymin
- Category: Information Security, Risk Management, Threat Intelligence
No CommentsSources: InfosecInstitute Zero-day (0day) exploit, Imperva Cybersecurity: How to get your software patching strategy right and keep the hackers at bay, ZDNet Five Key Capabilities To Look for in a Managed Web Application Firewall (WAF) Provider, GBHackers on Security Introduction Zero-day attacks are one of the most dangerous cybersecurity threats. This type of
-
Threat Intelligence: Zero to One
- February 18, 2017
- Posted by: Edem Glymin
- Category: Threat Intelligence
Threat Intelligence: Zero to One February 18, 2017 Posted by: Edem Glymin Category: Threat Intelligence No Comments Introduction Today, the biggest gap in the cyber security of organizations is that companies work in isolation while criminals are working in collaboration. This is exactly the reason for the sudden rise of the new domain in
Contact Global Secure Solutions by completing our online feedback form.