
Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise
The Cyber Threat Perspective
00:00
How do attackers find exposed technologies to target quickly?
Brad explains internet-wide scanning and how adversaries buy IP lists to mass-scan and exploit newly disclosed flaws.
Play episode from 22:58
Transcript


