The Common Vulnerability Scoring System: Get your threat priorities right

By on
The Common Vulnerability Scoring System: Get your threat priorities right

Over the years, I’ve seen and used a diverse range of methods to evaluate and explain the risks associated with a particular security threat or vulnerability. Depending on the audience and the nature of the environment being evaluated, there has always been – and always will be – a frequent need to reclassify the severity of a finding. This is particularly relevant when making use of findings derived from automated security tools.

A pet peeve I've always had relates to consultants who insist on producing client reports by mindlessly copying tool-discovered vulnerability information without any reflection on the environmental context of the security assessment. By failing to incorporate this information, they can cause ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?