Scott Petry
Port-sniffing. Network intrusion. Spoofing. Viruses. Trojans. SQL injection. Cross-site scripting. Ransomware. Malware embedded in ads. Zero-day browser flaws. Security misconfiguration and broken authentication. Unvalidated redirects. It plays out time and again: A bad person invents a way to attack a computer or a network. A good person discovers the attack