“I don’t care what that report says, the threat actor has to be utilizing vector #1 because that is what our threat model says they’ll use….” Although the comment above is offered for humor, cyber security professionals are routinely at risk of making analytical errors very similar to the one implied. These errors are rarely […]
We’ll keep you in the loop.