(Source: CSO Online) Roughly half of the enterprise attacks employ “fileless” tactics, about another half exploit unpatched endpoint software vulnerabilities, and filling out the rest are social engineering attacks, tricking end-users into installing malware. A Ponemon … Recruiting such an army in today’s cyber skills gap climate is challenging.