Exploit Intelligence Project: Rethinking information security threat analysis

Exploit Intelligence Project: Rethinking information security threat analysis

Date: Oct 07, 2011

Enterprise information security threat analysis is fundamentally flawed, said Dan Guido, security consultant with New York-based consultancy iSEC Partners. In this video presentation, Guido discusses the Exploit Intelligence Project, a research initiative that encourages enterprises to refocus their efforts on a more defined set of relevant threats to make information security more efficient and less costly.

More on Vulnerability Risk Assessment

  • canderson

    How involved should execs be in software security programs?

    VIDEO - Video: Chris Wysopal of Veracode discusses how the role of security executives is evolving in application security and vendor management.
  • canderson

    The gaping hole in your vulnerability management program

    VIDEO - Authenticated vulnerability scanning may be just what your organization needs to complete its vulnerability management program. In this video, expert Kevin Beaver offers pointers for performing an authenticated vulnerability scan.
  • canderson

    How to make penetration test results matter

    VIDEO - Voodoo Security founder Dave Shackleford details how enterprises can make penetration test results more meaningful than a compliance exercise.
  • Adding the age of networking devices into a security risk assessment

    Answer - Recent data shows that more than 50% of all networking devices are aging or obsolete and pose a security risk to the enterprise. Expert Kevin Beaver discusses how to factor device age into a security risk assessment.
  • vulnerability management planning

    Definition - Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in hardware or software that could serve as attack vectors. The essential elements of vulnerability management include vulnerability scanning, vulnerability analysis, and vulnerability remediation.
  • The key to assigning risk values in an IT security risk assessment

    Answer - Security expert Michael Cobb offers pointers on how to assign risk values during a security risk assessment.
  • Five steps for improving an authenticated vulnerability scan

    Tip - Running an authenticated vulnerability scan can help detect flaws in your system, yet many organizations don't invest in this methodology. Security expert Kevin Beaver discusses five ways to get the most out of an authenticated vulnerability scan.
  • Debunking the myths of authenticated vulnerability scans

    Podcast - When it comes to authenticated vulnerability scans, there are many misunderstandings about the technology that leave organizations wary. Security expert Kevin Beaver explains what to expect from your scans.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: