Dark Reading: How Attackers Choose Which Vulnerabilities To Exploit
A look at how the bad guys choose their attack methods -- and what you can do about it

Michael Cobb
April 04, 2013

[Excerpted from "How Attackers Choose Which Vulnerabilities To Exploit," a new report posted this week on Dark Reading's Vulnerability Management Tech Center.]

It's an old but true adage: To protect yourself against a criminal, you have to think like a criminal. This certainly applies to IT security professionals working to keep their organizations' systems and data safe: To protect against a cyber attacker, you have to think like a cyber attacker.

Click the URL above to read the full article
Comments: 0
Votes:4