{"componentChunkName":"component---src-templates-blog-post-js","path":"/blog/are-you-prepared-for-zero-day-threats/","result":{"data":{"site":{"siteMetadata":{"title":"No Frills News"}},"contentfulNfnPost":{"postTitle":"Are you prepared for zero-day threats?","slug":"are-you-prepared-for-zero-day-threats","createdLocal":"2023-02-07 14:32:19.096532","publishDate":"2023-02-06 15:41:05+00:00","feedName":"Connected Car","sourceUrl":{"sourceUrl":"https://www.edn.com/are-you-prepared-for-zero-day-threats/"},"postSummary":{"childMarkdownRemark":{"html":"<p>Next, a zero-day attack occurs when the exploit is used to attack a system.\nAdvertisementFigure 1 Zero-day threats are cyberattacks that occur before a vulnerability within software has been fixed.\nThe ZTA architecture can be highly effective against zero-day threats because it limits the damage that an attacker can do.\nFor these types of attacks, it’s very helpful to have computer security experts handling network and computer security with a staff that can be there 24/7/265.\nIn this manner, zero-day threats can be stopped before they spread, even in embedded systems.</p>"}}}},"pageContext":{"slug":"are-you-prepared-for-zero-day-threats"}}}