Sometimes in security we find ourselves using certain terms very broadly. We use them correctly, but as we start to get down to it the specifics, the definition can vary a lot, and that puts us at a disadvantage.
Last episode we started answering a pivotal question in endpoint security, and today we’re going to keep on the same topic. It’s a biggie, so let’s get right to it.
Today we ask (again): What makes up a cyberattack?