Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal

Evaluate your own vulnerability assessment maturity

Published August 2018


The cybersecurity community is heavily focused on what attackers are doing. While threat intelligence and vulnerability research are invaluable, it only represents one side of the equation. Far less research has been dedicated to how defenders are responding.

There is a wealth of qualitative data available on what end users are doing, primarily derived from surveys. The reliability of survey data is dependent on the knowledge and honesty of participants. Results can be skewed by cognitive biases and lack of awareness. What someone believes they are doing is not always the same as what they are actually doing, especially when practical realities come into play. Quantitative research based on end-user behavior and telemetry data provides a more reliable basis for determining the true state of general VA maturity.

You will have to register, or log in, in order to download this paper.

Biting the hand that feeds IT © 1998–2018