Determining Vulnerability Exploitation With Real Software Activity - PSW #672
Oct 31, 2020
57:25
forum Ask episode
view_agenda Chapters
auto_awesome Transcript
info_circle Episode notes
Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction and other surrounding software characteristics provide the rich contextual clues to complete the picture.