To vulnerability database and beyond

Want to visit   +53

Author: Alexander Leonov

The speaker will talk about public databases of vulnerabilities and exploits, detection rules, security bulletins, and other security-related content. What's the use of such a database? Is it possible to automatically highlight hot topics by considering correlations between objects without going into technical details? Can such a database help to search and prioritize vulnerabilities in your infrastructure? Do you need security experts, or it is enough to buy your IT specialists a subscription for the vulnerability database?

  • Language
  • Russian

Expert in information security automation. For six years, had been engaged in development vulnerability scanners and IT compliance management. Works in Russia's largest internet company. Responsible for automated vulnerability assessment of a huge and diverse IT-infrastructure. Runs his own blog page on vulnerability management at avleonov.com.

Alexander Leonov Alexander Leonov

Back to the list