CVE and Beyond: Security Implications in Device Configuration
According to the latest Verizon Data Breach Investigations report there has been a ‘180% increase in the exploitation of vulnerabilities as the critical path action to initiate a breach’, so it’s not surprising that keeping on top of vulnerabilities is of critical importance....