Introducing the attacker’s perspective for securing the modern enterprise
“True cyber security is preparing for what’s next, not what was last.” – Neil Rerup, President and Chief Security Architect of Enterprise Cyber Security Architect, USA.
N...
In Part 1 of the evolution of vulnerability assessments in the cybersecurity blog series, we wrote about how approaches to managing vulnerabilities have evolved significantly over a period of time and have moved away from a tool-focused to a more pro...