PLAY PODCASTS
Determining Vulnerability Exploitation With Real Software Activity - PSW #672

Determining Vulnerability Exploitation With Real Software Activity - PSW #672

Paul's Security Weekly (Video) · Security Weekly Productions

October 30, 202057m 25s

Audio is streamed directly from the publisher (dts.podtrac.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction and other surrounding software characteristics provide the rich contextual clues to complete the picture.

This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them!

Visit https://www.securityweekly.com/psw for all the latest episodes!

Show Notes: https://wiki.securityweekly.com/psw672