
Sign up to save your podcasts
Or
For example, CISA has something called the Vulnerability Exploitability Exchange that lists known software vulnerabilities. Companies like Sonatype offer surveys where they identify thousands of lines of code with structural flaws.
One of the vulnerabilities (the Log4J) is well known. Rezilion announced it had scanned 90,000 servers that still had this problem.
So, having a list of vulnerabilities is not the issue. The concern is cleaning up the federal code in an effective manner.
5
55 ratings
For example, CISA has something called the Vulnerability Exploitability Exchange that lists known software vulnerabilities. Companies like Sonatype offer surveys where they identify thousands of lines of code with structural flaws.
One of the vulnerabilities (the Log4J) is well known. Rezilion announced it had scanned 90,000 servers that still had this problem.
So, having a list of vulnerabilities is not the issue. The concern is cleaning up the federal code in an effective manner.
1,463 Listeners
7 Listeners
6 Listeners