If anyone is wondering where the vuln data on pages 13-16 of the 2016 DBIR came from, it's IDS signatures.https://twitter.com/mroytman/status/589077391219167232 …
-
-
Replying to @gdbassett
@gdbassett@mroytman@raesene@VZDBIR@riskio Given the relative size difference, I'm sure IDS/Scanner data dominated though?2 replies 0 retweets 0 likes -
Replying to @dguido
@gdbassett@mroytman@raesene Sigh, this is getting off track. Even with that data, all must be informed by how attackers exploit it.3 replies 0 retweets 0 likes
@gdbassett @mroytman @raesene That was the source of my original comment about that graph and others in that section.
6:43 PM - 29 Apr 2016
0 replies
0 retweets
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.