August 22, 2016

"Playing whack-a-mole with software vulnerabilities should not be top of security pros' priority list..."

Dark Reading: ...because exploiting software doesn't even rank among the top five plays in the attacker's playbook, according to a new report from Praetorian. by Sara Peters

'Organizations would be far better served by improving credential management and network segmentation, according to researchers there.

'Over the course of 100 internal penetration tests, Praetorian pen testers successfully compromised many organizations using the same kinds of attacks. The most common of these "root causes" though, were not zero-days or malware at all.'

No comments: