searchsecurity.techtarget.com
Open in
urlscan Pro
206.19.49.153
Public Scan
URL:
https://searchsecurity.techtarget.com/podcast/Risk-Repeat-Is-vulnerability-marketing-problematic
Submission: On March 23 via manual from IN
Submission: On March 23 via manual from IN
Form analysis
3 forms found in the DOMGET https://www.techtarget.com/search/query
<form action="https://www.techtarget.com/search/query" method="get" class="header-search" style="width: 790px;">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" name="q" placeholder="Search the TechTarget Network">
<button class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>
<form id="loggedoutCommentsForm" class="comments-form logged-out">
<div class="cleditorMain" style="width: 100%; height: 200px;">
<div class="cleditorToolbar" style="height: 27px;">
<div class="cleditorGroup" style="width: 73px;">
<div class="cleditorButton cleditorDisabled" title="Bold" disabled="disabled"></div>
<div class="cleditorButton cleditorDisabled" title="Italic" disabled="disabled" style="background-position: -24px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Strikethrough" disabled="disabled" style="background-position: -72px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 73px;">
<div class="cleditorButton cleditorDisabled" title="Font" disabled="disabled" style="background-position: -144px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Font Size" disabled="disabled" style="background-position: -168px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Style" disabled="disabled" style="background-position: -192px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 49px;">
<div class="cleditorButton cleditorDisabled" title="Font Color" disabled="disabled" style="background-position: -216px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Remove Formatting" disabled="disabled" style="background-position: -264px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 49px;">
<div class="cleditorButton cleditorDisabled" title="Bullets" disabled="disabled" style="background-position: -288px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Numbering" disabled="disabled" style="background-position: -312px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 25px;">
<div class="cleditorButton cleditorDisabled" title="Insert Hyperlink" disabled="disabled" style="background-position: -576px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 25px;">
<div class="cleditorButton ttCleditorButton cleditorDisabled" title="Code" disabled="disabled"></div>
<div class="cleditorDivider"></div>
</div>
</div><textarea id="loggedoutCommentBody" class="comments-form-textarea" placeholder="Share your comment" style="border: none; margin: 0px; padding: 0px; display: none; width: 636px; height: 173px;"></textarea><iframe frameborder="0"
src="javascript:true;" style="width: 636px; height: 173px;"></iframe>
</div>
<fieldset class="notifications">
<input data-field="" id="notifications" name="notifications" checked="checked" type="checkbox"> Send me notifications when other members comment.
</fieldset>
<button type="submit" class="comments-form-btn submit" href="#comments-reg-login">Add My Comment</button>
<div style="display:none;">
<div id="comments-reg-login">
<section id="commenting-registration">
<div class="modal-register">
<h4>Register</h4>
<input class="comments-username" type="text" placeholder="Username">
<input class="comments-email" type="text" placeholder="email@techtarget.com">
<input class="comments-password" type="password" placeholder="Password">
<ul class="optInCheckboxesWrapper">
<li class="optInCheckboxes">
<fieldset class="checkboxList">
<ul class="default-list">
<li><input type="checkbox" id="comments-optin-privacy" name="comments-optin-privacy" value="true" data-required="true">
<label for="comments-optin-privacy"> I agree to TechTarget’s <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a>,
<a href="https://www.techtarget.com/privacy-policy-may25/" target="_blank">Privacy Policy</a>, and the transfer of my information to the United States for processing to provide me with relevant information as described in our
Privacy Policy.</label>
</li>
</ul>
</fieldset>
<div class="signupErrors">
<p id="comments-optin-privacy-error" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
</div>
</li>
<li class="optInCheckboxes">
<fieldset class="checkboxList">
<ul class="default-list">
<li><input type="checkbox" id="comments-optin-partners" name="comments-optin-partners" value="true" data-required="true">
<label for="comments-optin-partners"> I agree to my information being processed by TechTarget and its <a href="https://www.techtarget.com/privacy-partners/" target="_blank">Partners</a> to contact me via phone, email, or other
means regarding information relevant to my professional interests. I may unsubscribe at any time.</label>
</li>
</ul>
</fieldset>
<div class="signupErrors">
<p id="comments-optin-partners-error" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
</div>
</li>
</ul>
<input id="submit-register" class="comments-form-btn" type="submit" value="Add My Comment">
</div>
<div class="modal-divider"></div>
<div class="modal-login">
<h4>Login</h4>
<input class="comments-email" type="text" placeholder="email@techtarget.com">
<input class="comments-password" type="password" placeholder="Password">
<a class="forgot-password" href="#forgotPasswordModal">Forgot your password?</a>
<input id="submit-login" class="comments-form-btn" type="submit" value="Add My Comment">
<div style="display:none;">
<div id="forgotPasswordModal">
<section id="commenting-forgot-password">
<div id="forgotPasswordModalHeader">
<h4>Forgot your password?</h4>
<div id="forgotPasswordModalMessaging">
<span class="forgotPasswordModalIntro">No problem! Submit your e-mail address below. We'll send you an email containing your password.</span>
</div>
</div>
<input id="forgotPasswordModalFormMessage" name="email" tabindex="1" class="required" placeholder="email@techtarget.com">
<button type="submit" id="forgotPasswordModalFormSubmit" class="button primaryButton">Submit</button>
</section>
</div>
</div>
<div style="display:none;">
<div id="forgotPasswordModalConfirm">
<div id="forgotPasswordModalHeader">
<h4>Your password has been sent to:<span class="email"></span></h4>
</div>
</div>
</div>
</div>
</section>
</div>
</div>
</form>
<form class="comments-reply-form">
<div class="cleditorMain" style="width: 100%; height: 200px;">
<div class="cleditorToolbar" style="height: 27px;">
<div class="cleditorGroup" style="width: 73px;">
<div class="cleditorButton cleditorDisabled" title="Bold" disabled="disabled"></div>
<div class="cleditorButton cleditorDisabled" title="Italic" disabled="disabled" style="background-position: -24px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Strikethrough" disabled="disabled" style="background-position: -72px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 73px;">
<div class="cleditorButton cleditorDisabled" title="Font" disabled="disabled" style="background-position: -144px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Font Size" disabled="disabled" style="background-position: -168px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Style" disabled="disabled" style="background-position: -192px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 49px;">
<div class="cleditorButton cleditorDisabled" title="Font Color" disabled="disabled" style="background-position: -216px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Remove Formatting" disabled="disabled" style="background-position: -264px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 49px;">
<div class="cleditorButton cleditorDisabled" title="Bullets" disabled="disabled" style="background-position: -288px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Numbering" disabled="disabled" style="background-position: -312px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 25px;">
<div class="cleditorButton cleditorDisabled" title="Insert Hyperlink" disabled="disabled" style="background-position: -576px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 25px;">
<div class="cleditorButton ttCleditorButton cleditorDisabled" title="Code" disabled="disabled"></div>
<div class="cleditorDivider"></div>
</div>
</div><textarea class="comments-form-textarea" placeholder="Share your comment" style="border: none; margin: 0px; padding: 0px; display: none; width: 100px; height: 173px;"></textarea><iframe frameborder="0" src="javascript:true;"
style="width: 100px; height: 173px;"></iframe>
</div>
<button type="submit" class="comments-form-btn submit" href="#comments-reg-login" data-comment-parent="268_comment_125339">Add My Comment</button>
<a href="#" class="cancel-reply">Cancel</a>
</form>
Text Content
SearchSecurity Search the TechTarget Network Sign-up now. Start my free, unlimited access. Login Register * Techtarget Network * News * Features * Tips * More Content * Answers * Buyer's Guides * Definitions * Essential Guides * Opinions * Photo Stories * Podcasts * Quizzes * Tutorials * Sponsored Communities * Schools * SearchSecurity * Topic Risk management strategies * Data security * Identity and access management * Network security * Security training and jobs * Infosec programs * Information security threats * Network threat detection * Platform security * Security compliance * Software security * Web security tools * Wireless and mobile security * All Topics * SubTopic Vulnerability assessments * Vulnerability assessments * Risk assessments * Security awareness training * All Subtopics * Follow: * * * Nmedia - Fotolia Nmedia - Fotolia News Stay informed about the latest enterprise technology news and product updates. RISK & REPEAT: IS VULNERABILITY MARKETING PROBLEMATIC? * 1 * By * Rob Wright, News Director Published: Oct 26, 2017 Related Podcasts * Wireless hot spot security -- podcast * Risk & Repeat: Windows zero-day sparks disclosure debate * Risk & Repeat: More Symantec vulnerabilities emerge * Risk & Repeat: How bad is the httpoxy vulnerability? * View All Podcasts Share this item with your network: * * * Listen to this podcast In this week's Risk & Repeat podcast, SearchSecurity editors discuss vulnerability marketing and compare how the recent KRACK attack and ROCA flaw were publicized and promoted. 00:00 00:00 30:53 Podcast Should security vulnerabilities be marketed like products? That was the question after two major security flaws brought to light last week -- the KRACK attack and the ROCA flaw -- offered a contrast in the practice of vulnerability marketing. While the KRACK attack, which exploits a vulnerability in the WPA2 protocol, received more marketing and media attention, some infosec experts argued the ROCA flaw, which affects RSA encryption in Infineon Technologies chips, was equally, if not more serious than KRACK. Both vulnerabilities were discovered primarily by security researchers at universities, not by vendors. Yet, ROCA appeared to have taken a backseat to the KRACK attack; the latter discovery benefited from vulnerability marketing efforts, which included a dedicated website and promotional efforts to raise awareness of the WPA2 flaw. What are the potential drawbacks of vulnerability marketing? Should the researchers that discovered the ROCA flaw have done more to promote their findings, or is the infosec community treating vulnerabilities too much like products? SearchSecurity editors Rob Wright and Peter Loshin discuss those questions and more in this episode of the Risk & Repeat podcast. Rob Wright asks: HOW SHOULD THE INFOSEC INDUSTRY MARKET VULNERABILITY RESEARCH? Join the Discussion NEXT STEPS Risk & Repeat: DEFCON warns of voting machine security issues Risk & Repeat: The Kaspersky controversy continues Risk & Repeat: Equifax, Yahoo breaches grow larger JOIN THE CONVERSATION 1 COMMENT Send me notifications when other members comment. Add My Comment REGISTER * * I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy. Please check the box if you want to proceed. * * I agree to my information being processed by TechTarget and its Partners to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time. Please check the box if you want to proceed. LOGIN Forgot your password? FORGOT YOUR PASSWORD? No problem! Submit your e-mail address below. We'll send you an email containing your password. Submit YOUR PASSWORD HAS BEEN SENT TO: PLEASE CREATE A USERNAME TO COMMENT. Oldest Newest [-] Rob Wright - 26 Oct 2017 11:51 AM How should the infosec industry market vulnerability research? Add My Comment Cancel * -ADS BY GOOGLE LATEST TECHTARGET RESOURCES * Cloud Security * Networking * CIO * Enterprise Desktop * Cloud Computing * Computer Weekly SEARCHCLOUDSECURITY * DEFINING AND EVALUATING SOC AS A SERVICE As cloud use increases, many enterprises outsource some security operations center functions. Evaluate if SOCaaS is the best ... * GET TO KNOW THE ELEMENTS OF SECURE ACCESS SERVICE EDGE Cloud services use cases continue to expand, but implementation challenges remain. Discover Secure Access Service Edge, or SASE, ... * BOOST SECURITY WITH A MULTI-CLOUD WORKLOAD PLACEMENT PROCESS IT must incorporate a multi-cloud workload placement process into its multi-cloud strategy in order to maintain or improve cloud ... SEARCHNETWORKING * CORONAVIRUS: VPN HARDWARE BECOMES A CHOKEPOINT FOR REMOTE WORKERS VPN hardware has become a bottleneck for companies with a high number of employees working from home as a result of efforts to ... * DISCOVER KEY OPENSTACK DEPLOYMENT METHODS FOR NETWORKS In this book excerpt, explore best practices for OpenStack deployment methods, and glean expert advice on how to achieve an ... * BUSINESS CULTURE IS KEY IN OPENSTACK NETWORK REQUIREMENTS Network teams should expect a shift in their day-to-day routines if their organization embraces OpenStack. However, if the ... SEARCHCIO * HOW RPA AND DIGITAL TRANSFORMATION WORK TOGETHER Enterprises that think RPA is a good endpoint for digital transformation efforts are in for a rude shock. While automation is a ... * HOW TO ENSURE CYBERSECURITY PLANS ALIGN WITH BC/DR PLANS It's crucial for organizations to have a collection of emergency-focused plans in place that can interact with each other if a ... * HOW TO NEGOTIATE A GOOD SOFTWARE SUBSCRIPTION AGREEMENT A big mistake IT execs make in negotiating software subscription deals is overbuying. Here are seven steps from ClearEdge ... SEARCHENTERPRISEDESKTOP * CORONAVIRUS PANDEMIC: 5 REMOTE WORK TIPS FOR IT VMware's Shawn Bass and Brian Madden shared tips to help IT workers make remote work a reality for their organizations as the new... * HOW TO ENSURE THAT UEM SUPPORTS RUGGED DEVICE MANAGEMENT Rugged devices have different needs and requirements than the average device. Organizations should ensure that their UEM ... * COMPARE CAPABILITIES OF OFFICE 365 MDM VS. INTUNE Office 365 MDM and Intune both offer the ability to manage mobile devices, but Intune provides deeper management and security. ... SEARCHCLOUDCOMPUTING * 6 AMAZON SAGEMAKER CAPABILITIES DEVELOPERS SHOULD KNOW ABOUT Developers and data scientists should familiarize themselves with these six SageMaker tools meant to simplify the machine ... * 7 TIPS TO MANAGE CLOUD SPRAWL IN YOUR ENTERPRISE Cloud sprawl can lead to all sorts of unwanted surprises. Review these recommendations to get control over all the cloud ... * WHAT TO MAKE OF AWS' MULTI-CLOUD STRATEGY, OR LACK THEREOF AWS eventually caved when it came to hybrid cloud. Some experts and partners say the same will happen with its multi-cloud ... COMPUTERWEEKLY.COM * CORONAVIRUS PROMPTS CROSS-INDUSTRY COLLABORATION FROM DATACENTRE OPERATORS TO KEEP UK ONLINE TechUK positioning document reveals datacentre operators are putting their competitive differences aside to share best practice ... * CHUNGHWA TELECOM SELECTS NOKIA, ERICSSON FOR RAPID 5G BUILD-OUT Taiwanese operator taps Nordic comms giants for essential equipment in improving efficiency and user experience * SINGAPORE’S JTC TAPS GIS PLATFORM IN PUNGGOL DIGITAL DISTRICT The planners behind Singapore’s Punggol Digital District are using a geographic information system to make better planning ... * About Us * Meet The Editors * Contact Us * Privacy Policy * Videos * Photo Stories * Definitions * Guides * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * CPE and CISSP Training * Reprints * Archive * Events * E-Products All Rights Reserved, Copyright 2000 - 2020, TechTarget Do Not Sell My Personal Info Arial Arial Black Comic Sans MS Courier New Narrow Garamond Georgia Impact Sans Serif Serif Tahoma Trebuchet MS Verdana 1 2 3 4 5 6 7 Paragraph HEADER 1 HEADER 2 HEADER 3 HEADER 4 HEADER 5 HEADER 6 Enter URL: Paste the code: Close