- DNS hijacking grabs headlines, but it’s just the tip of the iceberg
- Becoming more than human: My take on the advancements of Machine Technology
- SecurIT 2019: In an increasingly-encrypted world, visibility is more important than ever
- SecurIT 2019: Being a CSO is like Game of Thrones
- SecurIT 2019: Hackers may be in it for Lulz, but CSOs are in it for their lives
Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads.
Read this paper to learn more about exploits and how to stop them. It explores how exploits work, the exploit industry, what makes a good exploit in the eyes of the cybercriminals, and also how anti-exploit technology is a highly efficient and effective way to secure your organisation against advanced and unknown threats.
- Gartner: Customer analytics hinges on asking the right questions and change management
- NRMA: Getting smarter about the voice of customer
- IAB launches mentorship program for digital advertising industry
- State of the CMO 2019: Tenure shortens, pressure is on as marketers strive to demonstrate impact
- What’s next for Campaign Monitor and CM Group’s family of martech brands