← @kwm Twitter archive

Keith

@kwm

10/Whether the vector is email, watering hole, infected media: The attacker needs access to an endpoint. The defender needs endpoint data.

7/3/2015, 10:40:53 PM

Favs: 0

Retweets: 0