What is Reinforcement Learning (RL)? Definition, Algorithms, Examples
Sixgill: Automated Protection Against Common Vulnerabilities and Exposures
Attacks have become part and parcel of an organisation's lifespan. However, in most cases, this is the result of the attacker being able to exploit a weakness in the organisation. Thus, organisations must do what they can to understand their vulnerabilities and their impact. But understanding and reporting common vulnerabilities and exposures (CVEs) are rigorous tasks. Therefore, companies may benefit from using tools to increase automation and reduce manual procedures.
In this podcast, freelance IT industry analyst Bob Tarzey speaks with Benjamin Preminger, Senior Cyber Threat Intelligence Specialist at Sixgill. Benjamin begins by outlining the differences between common vulnerabilities and exposures, and demonstrates the rate at which they are reported. He also shares his thoughts on the MITRE database and the inadequacies in their scoring. As well as this, Benjamin explores why a dynamic CVE scoring will make the patching process more manageable for security professionals.
Join 34,209 IT professionals who already have a head start
Meet the panel
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
Fivetran: The Biggest Challenges Facing Data Leaders Today - And How to Solve Them
Informatica: Harnessing Data, AI and Cloud for a 360-Degree View of your Business
Zero Networks: Reinventing Identity Security
Fivetran: Modern Data Leader’s Guide to Improved Customer Outcomes
Radware: 360 Application Protection and Why Companies Need It
HID Global: Choosing the Right Visitor Management Solution
Huntress: Doing More With Less in Your Cybersecurity Strategy
Savvy: SaaS Identity Discovery and Visibility
Sifflet: Data Observability 101