@alexhutton Yeah, twitter sucks for this. Bottom line, I think DBIR can do better than aggregate vuln counting w/ IDS logs...
@alexhutton Why not extract exploit use from incident data rather than import from Kenna? It's easier to map to patterns / groups that way.
-
-
@alexhutton As it is, the IDS+Scanner logs combo is measuring "weather" on the internet (subject to sig quality) more than abused vulns.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@dguido@alexhutton we tried - a very small amount of VZ incidents have CVEs, and no volume/velocity -
@mroytman@alexhutton I'm guessing that's because so few IR shops characterize exploits rather than hackers exploiting unique non-CVE vulns
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.