Industry developed new approach to protect against advanced ‘ROP’ Cyberattacks

Today’s cybersecurity playing field is fundamentally asymmetric. Attackers are easily able to identify weaknesses in a target system once they have access to its code and configuration. As a result, defenders are perpetually playing a game of catch-up to secure their systems post-attack.   ROP attacks are particularly insidious in that they harness software components…

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

IDST Pro Access Required

This analysis is part of IDST premium intelligence.

Subscribe to Continue Reading