The top six exploits and how zero trust can mitigate them

clock • 4 min read
The top six exploits and how zero trust can mitigate them
Image:

The top six exploits and how zero trust can mitigate them

ThreatLocker VP operations explains how stopping illegal conversations between software programs could have prevented exploitation of the major vulnerabilities of the past two years

The top six exploits of the past couple of years have seen billions of devices, millions of organisations and numerous individuals adversely affected by cyber attacks, said Rob Allen, VP of operati...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
SSO is dead: Why the age of zero trust demands secure explicit sign-on

Security Technology

Single sign-on's cons now outweigh the pros

clock 03 September 2024 • 5 min read
SolarWinds patches eight critical flaws in Access Rights Manager software

Threats and Risks

Disclosure raises fresh security concerns

clock 21 July 2024 • 3 min read
Oracle's controversial stewardship of Java: The good and the bad

Open Source

Oracle is doing a good job in keeping Java relevant. But that's pretty much where it ends, says Azul CTO

clock 15 February 2024 • 5 min read
Most read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

China refuses to sign agreement on AI control of nuclear weapons

China refuses to sign agreement on AI control of nuclear weapons

Global call to maintain human involvement in all nuclear related decisions

clock 12 September 2024 • 3 min read
Microsoft Patch Tuesday: Four zero day bugs squashed

Microsoft Patch Tuesday: Four zero day bugs squashed

In a total of 79 vulnerabilities patched in September

John Leonard
clock 11 September 2024 • 2 min read
UK and allies reveal methodology of Russian GRU threat actor Unit 29155

UK and allies reveal methodology of Russian GRU threat actor Unit 29155

Group has targeted organisations including governments and critical infrastructure providers for espionage purposes

John Leonard
clock 06 September 2024 • 2 min read