Vulnerabilities in deployed software are the genuine Achilles heel of our digital systems today—networks, computers, mobile devices, biometrics, even the Internet of Things (IoT). Why? Some 80% of the successful cyber-attacks (including WannaCry, Petya, NotPetya, the Russian hack on the DNC, and the North Korean hack against the Central Bank of Bangladesh) exploited known vulnerabilities in deployed software.
If you’ve ever wondered what a software vulnerability is and why it’s so important to security, this article provides insight from cybersecurity insiders.
Read the full article on Insurance Advocate.