The DROWN attack was designed to use brute force to attack an enterprise’s SSLv2 servers. This attack vector represents a significant risk to organizations and their encrypted data.
To minimize the risk, you need to do more than simply update affected server implementations. Your organization needs to have a strategy for finding all of the instances of potential risks.
Read our threat brief to learn tips for helping your organization minimize exposure to the DROWN attack.