/images/quoteimage/alex-stamos-fb-22733.jpg

Attackers are able to amortize the cost of exploit, malware, and infrastructure development across many targets.

Alex Stamos