Computing and Information Technology

Managing Vulnerabilities - Patched or Patchy?


Listen Later

The exploitation of vulnerable systems is a significant attack vector for both intruders and malicious code. Steven Furnell examines the challenge of vulnerability management, and the possible overheads even if trying to take a responsible stance. He also considers cases in which exposure is heightened by continuing to use vulnerable technologies that cannot be adequately secured.
The session was part of Secure South West 4, at Plymouth University on 10 July 2014.
[(CC) BY-NC-SA 2.0 UK]
...more
View all episodesView all episodes
Download on the App Store

Computing and Information TechnologyBy Plymouth University