The Top Seven Most Misused Terms In Cybersecurity
Blog: Forrester BPM Center of Excellence
A common point of confusion in inquiries, briefings, and advisories is the difference between a vulnerability, a threat, and an attack. Do you detect a vulnerability? Is an exploit an attack? The answer to both these questions is no. It’s easy to conflate all these terms in the course of overzealous marketing, but ultimately, words […]
Leave a Comment
You must be logged in to post a comment.