Case study demonstrating how application whitelisting technology can prevent zero-day exploits, using a Microsoft Word vulnerability as an example.

Read the full article (PDF)

Originally published on Carbon Black Blog