Analyzing Vulnerability Remediation Strategies with Cyentia Institute
Jul 15, 2020
Share with Your Network
The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute – guests Ed Bellis and Wade Baker discuss P2P Volume 1 which quantifies the performance of vulnerability prioritization and remediation strategies for the very first time.
If you have any feedback or want to be a guest on the podcast? DM me via Twitter @DTMellinger
Read the Latest Content
Research Reports
Prioritization to Prediction Volume 5: In Search of Assets at Risk
The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks
5 Things Every CIO Should Know About Vulnerability Management
If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look. Managing vulnerabilities is...
DOWNLOAD NOW
Videos
Videos
Get Started Using the Exploit Prediction Scoring System (EPSS).
Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE