If anyone is wondering where the vuln data on pages 13-16 of the 2016 DBIR came from, it's IDS signatures.https://twitter.com/mroytman/status/589077391219167232 …
@gdbassett @mroytman @raesene @VZDBIR @riskio Given the relative size difference, I'm sure IDS/Scanner data dominated though?
-
-
@gdbassett@mroytman@raesene Sigh, this is getting off track. Even with that data, all must be informed by how attackers exploit it. -
@gdbassett@mroytman@raesene That was the source of my original comment about that graph and others in that section.
End of conversation
New conversation -
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.