Every organization is at risk for zero-day exploits regardless of size. These exploits will often circulate for months until the vulnerability is made public, leaving organizations unprotected. This paper will discuss various methods that organizations can use to better detect zero-day exploits....