In today's threat landscape, many users are being compromised by exploit kits and phishing campaigns. These offensive techniques are successful because they target vulnerable outdated software and unsuspecting users. There are free tools and configuration options to help prevent the execution of malicious binaries, the exploitation of web browsers, and third party applications that are utilized by the browser. This presentation will introduce four methods to strengthen your host environment by using third party tools and customized configurations.
Kurtis Armour is a security professional who has been working in the industry for 4 years. He enjoys working on research projects and increasing his security knowledge. Pastime activities include mountain biking, golfing, squash, skydiving and lots more.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek