Tech Spotlight: Journey Through the IoT to the Cloud: Finding the ‘Zero-day’ Vulnerabilities
Check Point’s white hat research team which has discovered the existing malware out in the wild and also the’zero-day vulnerabilities discusses use cases around how organizations with responsible disclosure can further secure networks and devices.
It is imperative for organizations to under what the threat actors are doing in real-time.
The session discusses:
- Findings around the ‘zero-day’ vulnerabilities;
- Detecting threat actors movements in the networks, IoT devices, mobile and on the cloud in real-time;
- Securing the networks and devices