Program
To vulnerability database and beyond
Author: Alexander Leonov
The speaker will talk about public databases of vulnerabilities and exploits, detection rules, security bulletins, and other security-related content. What's the use of such a database? Is it possible to automatically highlight hot topics by considering correlations between objects without going into technical details? Can such a database help to search and prioritize vulnerabilities in your infrastructure? Do you need security experts, or it is enough to buy your IT specialists a subscription for the vulnerability database?
- Language
- Russian
- Info
- Video
- Presentation
Expert in information security automation. For six years, had been engaged in development vulnerability scanners and IT compliance management. Works in Russia's largest internet company. Responsible for automated vulnerability assessment of a huge and diverse IT-infrastructure. Runs his own blog page on vulnerability management at avleonov.com.
