Media coverage

The exploitation game

Sorry, this post has not been published yet, check again later!

November 30, 2015
Published by:

Computing Security

What steps can be taken to detect and block exploits that take advantage of software vulnerabilities? And how can security teams better understand the behaviour of legitimate software components? Preventing the exploitation of software vulnerabilities is desirable but their detection is a must for organisations and their security teams.

Read publication

Most recent media coverage

What’s cybercriminals’ most effective weapon in a ransomware attack?

September 19, 2019

(In)secure Magazine

Read more

Cyberwar is here: Are you ready?

September 19, 2019

PC Magazine

Read more

Capital One: What’s in your cloud?

September 19, 2019

Security Magazine

Read more