보안402 [Michael Roytman] Who Watches the Watchers: Metrics for Security Strategy Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman from Michael Roytman 2015. 9. 7. [David Severski] Vulnerability Management Nirvana: A Study in Predicting Exploitability RSAC 2015 - Vulnerability Management Nirvana from David Severski 2015. 9. 7. [US-CERT: Bulletin(SB15-243)] 2015년 8월 24일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2015. 8. 31. [plainbit] 어떻게 대응할 것인가 (FICON2015) #1 어떻게 대응할 것인가? from plainbit 2015. 8. 19. 이전 1 ··· 55 56 57 58 59 60 61 ··· 101 다음