Ready to implement a Risk-Based Vulnerability Management approach?  
Download The Guide Now>
Contact Us
Talk to an Expert
Request a demo

Understanding Why Vulnerabilities Are Exploited

Understanding Why Vulnerabilities Are Exploited

Why are some vulnerabilities exploited when so many aren’t? What are the characteristics of a vulnerability that make it more likely to be exploited than another?

Join Michael Roytman, Chief Data Scientist at Kenna Security, and Jay Jacobs, Data Scientist from the Cyentia Institute, as they uncover the causes of vulnerability exploits.

Listen in as they continue their discussion from RSA on vulnerabilities, and their conclusions from an in-depth review of many different data sources including tens of thousands of vulnerabilities, CVSS scores, CVE, NVD, and mailing lists and data feeds.

Share with Your Network

Sign up for a Free Trial

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.