When it comes to zero-day vulnerabilities, the best approach is preventative action

CERT-LatestNews ThreatsCybercrime VulnerabilitiesAll VulnerabilitiesApplications VulnerabilitiesDBMS VulnerabilitiesGoogle VulnerabilitiesNetwork

As many as 90 per cent of security attacks are a result of exploits against software flaws and defects, according to the Software Engineering Institute. Yet, most “solutions” to these incidents focus on detecting and responding to the attack rather than identifying and fixing the faulty code that caused the vulnerabilities in the first place.