blog
What Is Vulnerability Intelligence?
Picture this: it’s a Monday morning, and you’ve just found out that a critical vulnerability was announced on your favorite security news site. Let’s suppose that the announcement of this vulnerability coincided with the presentation of a proof-of-concept (PoC) that takes advantage of this vulnerability. By Monday afternoon, your network logs are flush with the signs of vulnerability scanning. You don’t know who’s behind it, but there’s a lot of scanning hitting the castle wall.
To read the full blog, please click the 'read more' button.