Главная
Study mode:
on
1
Intro
2
Risk
3
Value
4
Cost
5
Log for Shell
6
Main Message
7
Software Build Materials
8
Modeling Gap
9
Mapping
10
Not everything is affected
11
Policies
12
VEX
13
Workflow
14
Gaps
15
Questions
16
Sbomb
17
Sbomb Problems
18
Open Source
19
VEX Documents
20
Is there a repository
21
CycloneDX
22
What VEX is trying to do
23
Duplicate CVs
24
Conclusion
Description:
Explore the concept of VEX (Vulnerability-Exploitability eXchange) and its potential to revolutionize CVE management in this informative conference talk. Learn how VEX can significantly reduce CVE noise and improve vulnerability assessment processes for both small development teams and large-scale vulnerability management programs. Discover the integration of VEX with SBOMs (Software Bill of Materials) and its role in enhancing Zero Trust infrastructure. Gain insights into using VEX as a consumer to better determine vulnerability risks and mitigation strategies, as well as its application for vendors in effectively communicating actionable information to customers. Delve into topics such as software build materials, modeling gaps, mapping, policies, workflows, and the challenges associated with SBOMs. Examine the role of open-source in VEX implementation and understand the structure of VEX documents. Conclude with a discussion on duplicate CVEs and the broader implications of VEX in the cybersecurity landscape. Read more

How to Reduce CVE Noise with VEX - Vulnerability-Exploitability eXchange

CNCF [Cloud Native Computing Foundation]
Add to list