Keith
@kwm
10/Whether the vector is email, watering hole, infected media: The attacker needs access to an endpoint. The defender needs endpoint data.
7/3/2015, 9:40:53 PM
Favs: 0
Retweets: 0
link← @kwm Twitter archive
Keith
@kwm
10/Whether the vector is email, watering hole, infected media: The attacker needs access to an endpoint. The defender needs endpoint data.
7/3/2015, 9:40:53 PM
Favs: 0
Retweets: 0
link