Determining Vulnerability Exploitation With Real Software Activity – PSW #672 | SC Media
Vulnerability management

Determining Vulnerability Exploitation With Real Software Activity – PSW #672

October 30, 2020



Sponsored By


Visit for more information!


Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction and other surrounding software characteristics provide the rich contextual clues to complete the picture.

This segment is sponsored by Vicarius.

Visit to learn more about them! Visit for all the latest episodes!

Full Episode Show Notes

Determining Vulnerability Exploitation With Real Software Activity

Prioritizing Vulnerabilities: A Holistic Approach:


[caption id="attachment_210" align="alignleft" width="120"]Doug White Doug White - Professor[/caption] [caption id="attachment_210" align="alignleft" width="120"]Jeff Man Jeff Man - Sr. InfoSec Consultant[/caption] [caption id="attachment_210" align="alignleft" width="120"]Lee Neely Lee Neely - Senior Cyber Analyst[/caption] [caption id="attachment_210" align="alignleft" width="120"]Paul Asadoorian Paul Asadoorian - Founder & CTO[/caption] [caption id="attachment_210" align="alignleft" width="120"]Tyler Robinson Tyler Robinson - Managing Director of Network Operations[/caption]


[caption id="attachment_210" align="alignleft" width="120"]Roi Cohen Roi Cohen - Co-Founder & VP Sales[/caption] [caption id="attachment_210" align="alignleft" width="120"]Shani Dodge Shani Dodge - C++ Developer[/caption]


  • Security Weekly, in partnership with CyberRisk Alliance, is excited to present Security Weekly Unlocked on December 10, 2020. This 1 day virtual event wraps up with the 15th anniversary edition of Paul’s Security Weekly live on Youtube! Visit to view the agenda and register for free!

[audio src=""]

prestitial ad