How to protect yourself from APTs to avoid incidents like the Microsoft Exchange case
The attack exploited zero day vulnerabilities in Microsoft Exchange but above all it highlighted the risk organizations face from sophisticated APTS from groups linked to foreign powers. How can organizations protect themselves against this type of threat?