Do we not understand that counting vulnerabilities without context is useless? Verizon organized their data into attack patterns, c'mon.
This graph appears on page 23, and it's the first real useful one so far. Let's see what else we can read into from it.
-
-
Everyone is looking at everyone's health records in the healthcare industry.
-
Cyberespionage is HUGE is manufacturing (outside the obvious professional and government industries)
- 18 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.