What is the best way to safely execute potentially malicious code?

Sideloading9%

Sandboxing31%

Vulnerability Scanning29%

Containerization29%

Other

156 PARTICIPANTS
1k viewscircle icon1 Comment
Sort by:
CISO in Software4 years ago

I am confused by this one. How can vulnerability "scanning" execute code? 🤔

Content you might like

External threats (DDoS attacks, etc.)36%

Internal threats caused by human error (poor password hygiene, phishing, stolen devices, etc.)61%

Something else (comment below)1%

View Results