
Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise
The Cyber Threat Perspective
00:00
What do we mean by exploitation of edge and web systems?
Hosts define exploits targeting web apps, edge devices, and examples like MoveIt and Fortinet, clarifying the attack surface.
Play episode from 04:12
Transcript


