
Today’s endpoint positive security goes far beyond the whitelisting of yesteryear. Sometimes called OS-Centric Positive Security, current positive security models focus on the damage stage of the attack. While attack strategies are ever changing and are nearly unlimited, the intentions of the attacker in the damage stage remains fairly static […]