Exploits Explained: Comprehensive Exploit Prevention and Vendor Offerings

Provided by: Sophos
Topic: Security
Format: PDF
Exploits are commonly used in cyber attacks: upwards of 90% of reported data breaches involve an exploit at one or more points in the attack chain. Including exploit prevention as part of a comprehensive lineup of security defenses is clearly valuable. Read this paper to learn about 23 exploit techniques that are used by cybercriminals and nation-states, and compare how the mitigations for these techniques vary by vendor.

Find By Topic