According to CNN Money, more than 317 million new pieces of malware – computer viruses or other malicious software – were created last year. This means nearly one million new threats were released each day. This has been the case since the Morris Worm incident of 1988, and is predicted to get worse.1 Traditional cybersecurity focuses on protection against and detection of the first six steps of the cyber kill chain: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, and Command and Control.2 This approach results in too many attack vectors to track. The best new approaches will reduce the threat surface.
Outcome . . .