Presented by
-
Maciej Halasz
VP of EMEA Business Development and Technical Sales, Timesys
Sign in to access this content and additional site features.
Understanding the exposure of your embedded systems to cybersecurity threats requires analysis of a continuous stream of vulnerabilities and how they apply to a product.
But which vulnerabilities apply to your software components? How big of a risk do specific CVEs pose to your product? Which have the greatest chance of being exploited in deployment? Which ones put your customers at the greatest risk of a security breach?
Emergency room doctors triage patients to determine whom to help first. Similarly, a vulnerability triage process enables your team to understand which vulnerabilities need to be fixed first.
This training explores best practices for answering these questions using this process.Best Practices for Triaging Common Vulnerabilities and Exposures (CVEs) in Embedded Systems
Best Practices for Triaging Common Vulnerabilities and Exposures (CVEs) in Embedded Systems - Q&A
Maciej Halasz
VP of EMEA Business Development and Technical Sales, Timesys
Ask our Vigiles community and get expert advice.
Subscribe to our newsletter to stay updated with our latest developments and if you need further assistance, we are here to help.
Subscribe Contact Support