WikiLeaks recently published thousands of documents they acquired from the CIA, describing in detail the tools and techniques used to hack into computers and connected devices around the world. Now that these capabilities are informing cyberattackers everywhere, every security professional will need to take measures to protect their data and their systems, especially in the area of endpoint security.
Learn how this leak impacts your organization, and what you need to do today to shore up your defenses.
- What is Vault 7 is and what did we learn from it?
- How will attackers start using new non-malware attacks and other leaked techniques?
- What can next-generation antivirus do to protect against these attacks?
- What other recommended precautions should cybersecurity professionals take?