Главная
Study mode:
on
1
Introduction
2
Agenda
3
State of Vulnerability Databases
4
Telephone Game Problem
5
Trust
6
Package First
7
Why vulnerable code
8
Tools
9
Data Source
10
Aggregate Correlate
11
Multilevel Refinement
12
Growth Packages
13
Missing Packages
14
Duplicated Data
15
Other Issues
16
Future Plans
17
Outro
Description:
Explore a thought-provoking conference talk that challenges conventional thinking about vulnerability databases. Delve into the current state of these databases and uncover the "Telephone Game Problem" affecting data integrity. Examine the importance of trust and the concept of putting packages first. Investigate why focusing on vulnerable code is crucial and learn about tools and data sources for effective vulnerability management. Discover techniques for aggregating, correlating, and refining data across multiple levels. Address challenges such as growth packages, missing packages, and duplicated data. Gain insights into future plans for improving vulnerability databases and enhancing overall cybersecurity practices.

A Vulnerability Database Should Not Be About Vulnerabilities

Linux Foundation
Add to list
0:00 / 0:00