Paulius Petretis, leading cyber security expert talks about the threat of zero-day exploits and the fact that they can go undetected for long periods of time giving cyber criminals openings to steal valuable information without fear of getting caught. He also discussed how IBM Watson for cyber security can detect unexpected patterns revealing the flaws that give rise to zero-day exploits.

 Vilnius, Lithuania – April 13, 2017 – Paulius Petretis, CEO of VORAS Consulting posted a new article on the company website entitled “Is Your Company Prepared To Prevent, Detect or Minimize a Zero-Day Exploit?” Mr. Petretis writes, “If you know anything at all about zero-day exploits, you’ll know they are among the most harmful vulnerabilities IT systems can be exposed to.” He adds, “If you don’t know about them, your IT system could be under attack right now and you wouldn’t even know it.”

Petretis points out that, “Zero-day vulnerabilities are software flaws that can be in place for up to a year before they are detected.” He elaborates, “Very often these flaws are not known to anyone except cyber attackers or black market suppliers who sell them to cyber criminals.”

According to Petretis, “One security report put it this way. “There is almost no defense against a zero-day attack. While the vulnerability remains unknown, the software affected cannot be patched, and anti-virus products cannot detect the attack through signature-based scanning.”

With the new EU General Data Protection Regulation (EU GDPR) bringing more stringent regulations for all businesses that store personal information regarding EU residents,” writes Petretis, “it’s imperative to become aware of and familiar with the potential vulnerabilities that exist.” He adds, “It is also important to have a method in place in the event your company is subject to a zero-day exploit.”

According to Petretis, “Defending your IT assets against zero-day threats requires a fundamentally new approach to cyber security. Yesterday’s signature-based defenses are not built for today’s tidal wave of exploits.”

The entire article can be read at


Paulius Petretis

Paulius Petretis is an Information security expert, Certified Information Systems Security Professional (CISSP®), Certified Information Security Manager (CISM®), Certified Information System Auditor (CISA®), Certified in the Governance of Enterprise IT(CGEIT®) and Certified in Risk and Information Systems Control (CRISC®), Guest speaker at various conferences and seminars, Trainer at information security related training courses.

According to the annual survey initiated by the Info Security Europe, a whopping 93% of large organizations and 76% of small businesses had at least a single information security breach in 2011. Only 18% of the organizations affected by the infringements related to data protection laws had a consistent and effective contingency plan in place. According to Paulius, information is not something static – it evolves and mutates every day. It is the ecosystem of every business and if a single cell fails, it can bring down the entire business.

Therefore ensuring a consistent and up-to-date information protection policy must be the priority for all businesses – no matter how big or small they are. As it might be unrealistic to believe that any young or experienced entrepreneur can be the jack of all trades, the really smart decision is to rely on specialists who dedicate their professional lives to getting to know everything there is to know about protecting important business information.

With more than 16 years of experience in helping people, small businesses, and government organizations to protect their business secrets, Paulius believes that information security must help businesses achieve goals but not vice versa.










Leave a Reply