If anyone is wondering where the vuln data on pages 13-16 of the 2016 DBIR came from, it's IDS signatures.https://twitter.com/mroytman/status/589077391219167232 …
-
-
@dguido I tweeted you before knowing your TZ. Get some sleep already, debate can wait ;-)@mroytman@EdwardsCP@raesene@VZDBIR -
@SushiDude@dguido@mroytman@EdwardsCP@VZDBIR hi all as I got copied in on this I thought I'd pen some thoughts https://raesene.github.io/blog/2016/04/30/Verizon-DBIR-Vulns-And-Cold-Fusion/ … -
@raesene@SushiDude@dguido@EdwardsCP@VZDBIR this is fine except "successful exploitation" means two different things to us. -
@mroytman@SushiDude@dguido@EdwardsCP@VZDBIR that may be key difference then, to me exploit MiTM = actually be MiTM and carry out exploit
End of conversation
New conversation -
-
-
@dguido@SushiDude@mroytman@raesene@VZDBIR Trust But Verify. Question Everything. The "cyber" landscape is vast and different for all.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.