How the market for zero-day vulnerabilites works


[Read the post]



I would think word would get around that some companies use the ostrich approach, while their competitors are aggressive about finding and patching flaws. It does not follow that corporate IT types will take their advice. I myself am condemned to use an outdated Windows and an outdated Internet Explorer to enter and use protected health information.


Welcome to my day job.


This topic was automatically closed after 5 days. New replies are no longer allowed.