Where can you find independent statistics about a security vendor’s activity in zero-day
exploit research?
A.
In the security vendor’s white-papers and presentations depicting diverse statistics
B.
On the software vendor’s website, which lists third-party individuals and organizations
who find zero-day exploits in the vendor’s software products
C.
In computer emergency response team (CERT) blogs around the globe
D.
On the NGIPS/NGFW vendor’s website where they compile statistics about their zero-day
exploit research