The Venom vulnerability: Little details bite back
We generally do a good job of protecting the big items in our infrastructures, applications, and frameworks. We can easily see and block the barbarians at the front door. We protect our networks with firewalls and deep packet inspection. We protect open services with code that identifies and blocks known attacks and brute-force attempts. We compartmentalize larger implementations so that a breach or problem in one doesn’t affect the others.