Mitigation Techniques and Practical Implementation of EMET

by Ben Rain
Oct. 2, 2017 1 comment Infosecwriters Detection & Response

As the size of the internet and number of devices both on the personal and enterprise level increases, so does the number of cyber criminals. With so many devices, and so many vulnerabilities within these networks, how do we keep information safe? The answer is a endless amount of applications, physical devices, intrusion detection systems and the list goes on. Wouldn't it be nice if there was an application already loaded on most operating systems that could give a substantial amount of protection for our vulnerable programs but was not hard to implement?

ariadnalunguco 4 months, 1 week ago

This article makes a good point and brings on a nice solution to all these cyber criminal problems. Nice!