Top tips: How you can shrink the time between a vulnerability and an attack
Top tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead. This week, we’re looking at how the gap between a vulnerability and an attack is shrinking rapidly. A vulnerability is discovered. It could be a small bug, a missed update, or a gap in how a system is configured. It gets reported, documented, and sometimes even publicly disclosed. For a long time, there used to be an extended window between discovery and attack.