Artwork

Content provided by Cisco Talos. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Talos or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Should we even care about vulnerability severity scores?

43:00
 
Share
 

Manage episode 358112099 series 1443020
Content provided by Cisco Talos. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Talos or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Everyone fears the dreaded 10-out-of-10 CVSS severity score on a vulnerability with "critical" written somewhere on the advisory. But does that number even matter to an attacker or hypothetical defender? Matt, Mitch and Lurene discuss the various ways the security community classifies vulnerabilities and how potential targets can use that information to their advantage. They discuss patching strategies, potential security holes that attackers look for and real-world cases of vulnerabilities that have led to breaches or cyber attacks.
Other suggested talking points:

  • Band jam sessions
  • Conference season getting underway
  • Whether Tom Petty's music is actually complex
  continue reading

154 episodes

Artwork
iconShare
 
Manage episode 358112099 series 1443020
Content provided by Cisco Talos. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Talos or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Everyone fears the dreaded 10-out-of-10 CVSS severity score on a vulnerability with "critical" written somewhere on the advisory. But does that number even matter to an attacker or hypothetical defender? Matt, Mitch and Lurene discuss the various ways the security community classifies vulnerabilities and how potential targets can use that information to their advantage. They discuss patching strategies, potential security holes that attackers look for and real-world cases of vulnerabilities that have led to breaches or cyber attacks.
Other suggested talking points:

  • Band jam sessions
  • Conference season getting underway
  • Whether Tom Petty's music is actually complex
  continue reading

154 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide