What makes up a cyberattack? (Part 2)

Sometimes in security we find ourselves using certain terms very broadly. We use them correctly, but as we start to get down to it the specifics, the definition can vary a lot, and that puts us at a disadvantage.

Last episode we started answering a pivotal question in endpoint security, and today we’re going to keep on the same topic. It’s a biggie, so let’s get right to it.

Today we ask (again): What makes up a cyberattack?