Determining Vulnerability Exploitation With Real Software Activity - PSW #672

Oct 31 2020 57 mins   15

Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction and other surrounding software characteristics provide the rich contextual clues to complete the picture.

This segment is sponsored by Vicarius. Visit to learn more about them!

Visit for all the latest episodes!

Show Notes: