searchsecurity.techtarget.com Open in urlscan Pro
206.19.49.153  Public Scan

URL: https://searchsecurity.techtarget.com/podcast/Risk-Repeat-Is-vulnerability-marketing-problematic
Submission: On March 23 via manual from IN

Form analysis 3 forms found in the DOM

GET https://www.techtarget.com/search/query

<form action="https://www.techtarget.com/search/query" method="get" class="header-search" style="width: 790px;">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" name="q" placeholder="Search the TechTarget Network">
  <button class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>

<form id="loggedoutCommentsForm" class="comments-form logged-out">
  <div class="cleditorMain" style="width: 100%; height: 200px;">
    <div class="cleditorToolbar" style="height: 27px;">
      <div class="cleditorGroup" style="width: 73px;">
        <div class="cleditorButton cleditorDisabled" title="Bold" disabled="disabled"></div>
        <div class="cleditorButton cleditorDisabled" title="Italic" disabled="disabled" style="background-position: -24px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Strikethrough" disabled="disabled" style="background-position: -72px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 73px;">
        <div class="cleditorButton cleditorDisabled" title="Font" disabled="disabled" style="background-position: -144px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Font Size" disabled="disabled" style="background-position: -168px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Style" disabled="disabled" style="background-position: -192px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 49px;">
        <div class="cleditorButton cleditorDisabled" title="Font Color" disabled="disabled" style="background-position: -216px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Remove Formatting" disabled="disabled" style="background-position: -264px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 49px;">
        <div class="cleditorButton cleditorDisabled" title="Bullets" disabled="disabled" style="background-position: -288px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Numbering" disabled="disabled" style="background-position: -312px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 25px;">
        <div class="cleditorButton cleditorDisabled" title="Insert Hyperlink" disabled="disabled" style="background-position: -576px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 25px;">
        <div class="cleditorButton ttCleditorButton cleditorDisabled" title="Code" disabled="disabled"></div>
        <div class="cleditorDivider"></div>
      </div>
    </div><textarea id="loggedoutCommentBody" class="comments-form-textarea" placeholder="Share your comment" style="border: none; margin: 0px; padding: 0px; display: none; width: 636px; height: 173px;"></textarea><iframe frameborder="0"
      src="javascript:true;" style="width: 636px; height: 173px;"></iframe>
  </div>
  <fieldset class="notifications">
    <input data-field="" id="notifications" name="notifications" checked="checked" type="checkbox"> Send me notifications when other members comment.
  </fieldset>
  <button type="submit" class="comments-form-btn submit" href="#comments-reg-login">Add My Comment</button>
  <div style="display:none;">
    <div id="comments-reg-login">
      <section id="commenting-registration">
        <div class="modal-register">
          <h4>Register</h4>
          <input class="comments-username" type="text" placeholder="Username">
          <input class="comments-email" type="text" placeholder="email@techtarget.com">
          <input class="comments-password" type="password" placeholder="Password">
          <ul class="optInCheckboxesWrapper">
            <li class="optInCheckboxes">
              <fieldset class="checkboxList">
                <ul class="default-list">
                  <li><input type="checkbox" id="comments-optin-privacy" name="comments-optin-privacy" value="true" data-required="true">
                    <label for="comments-optin-privacy"> I agree to TechTarget’s <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a>,
                      <a href="https://www.techtarget.com/privacy-policy-may25/" target="_blank">Privacy Policy</a>, and the transfer of my information to the United States for processing to provide me with relevant information as described in our
                      Privacy Policy.</label>
                  </li>
                </ul>
              </fieldset>
              <div class="signupErrors">
                <p id="comments-optin-privacy-error" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
              </div>
            </li>
            <li class="optInCheckboxes">
              <fieldset class="checkboxList">
                <ul class="default-list">
                  <li><input type="checkbox" id="comments-optin-partners" name="comments-optin-partners" value="true" data-required="true">
                    <label for="comments-optin-partners"> I agree to my information being processed by TechTarget and its <a href="https://www.techtarget.com/privacy-partners/" target="_blank">Partners</a> to contact me via phone, email, or other
                      means regarding information relevant to my professional interests. I may unsubscribe at any time.</label>
                  </li>
                </ul>
              </fieldset>
              <div class="signupErrors">
                <p id="comments-optin-partners-error" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
              </div>
            </li>
          </ul>
          <input id="submit-register" class="comments-form-btn" type="submit" value="Add My Comment">
        </div>
        <div class="modal-divider"></div>
        <div class="modal-login">
          <h4>Login</h4>
          <input class="comments-email" type="text" placeholder="email@techtarget.com">
          <input class="comments-password" type="password" placeholder="Password">
          <a class="forgot-password" href="#forgotPasswordModal">Forgot your password?</a>
          <input id="submit-login" class="comments-form-btn" type="submit" value="Add My Comment">
          <div style="display:none;">
            <div id="forgotPasswordModal">
              <section id="commenting-forgot-password">
                <div id="forgotPasswordModalHeader">
                  <h4>Forgot your password?</h4>
                  <div id="forgotPasswordModalMessaging">
                    <span class="forgotPasswordModalIntro">No problem! Submit your e-mail address below. We'll send you an email containing your password.</span>
                  </div>
                </div>
                <input id="forgotPasswordModalFormMessage" name="email" tabindex="1" class="required" placeholder="email@techtarget.com">
                <button type="submit" id="forgotPasswordModalFormSubmit" class="button primaryButton">Submit</button>
              </section>
            </div>
          </div>
          <div style="display:none;">
            <div id="forgotPasswordModalConfirm">
              <div id="forgotPasswordModalHeader">
                <h4>Your password has been sent to:<span class="email"></span></h4>
              </div>
            </div>
          </div>
        </div>
      </section>
    </div>
  </div>
</form>

<form class="comments-reply-form">
  <div class="cleditorMain" style="width: 100%; height: 200px;">
    <div class="cleditorToolbar" style="height: 27px;">
      <div class="cleditorGroup" style="width: 73px;">
        <div class="cleditorButton cleditorDisabled" title="Bold" disabled="disabled"></div>
        <div class="cleditorButton cleditorDisabled" title="Italic" disabled="disabled" style="background-position: -24px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Strikethrough" disabled="disabled" style="background-position: -72px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 73px;">
        <div class="cleditorButton cleditorDisabled" title="Font" disabled="disabled" style="background-position: -144px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Font Size" disabled="disabled" style="background-position: -168px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Style" disabled="disabled" style="background-position: -192px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 49px;">
        <div class="cleditorButton cleditorDisabled" title="Font Color" disabled="disabled" style="background-position: -216px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Remove Formatting" disabled="disabled" style="background-position: -264px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 49px;">
        <div class="cleditorButton cleditorDisabled" title="Bullets" disabled="disabled" style="background-position: -288px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Numbering" disabled="disabled" style="background-position: -312px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 25px;">
        <div class="cleditorButton cleditorDisabled" title="Insert Hyperlink" disabled="disabled" style="background-position: -576px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 25px;">
        <div class="cleditorButton ttCleditorButton cleditorDisabled" title="Code" disabled="disabled"></div>
        <div class="cleditorDivider"></div>
      </div>
    </div><textarea class="comments-form-textarea" placeholder="Share your comment" style="border: none; margin: 0px; padding: 0px; display: none; width: 100px; height: 173px;"></textarea><iframe frameborder="0" src="javascript:true;"
      style="width: 100px; height: 173px;"></iframe>
  </div>
  <button type="submit" class="comments-form-btn submit" href="#comments-reg-login" data-comment-parent="268_comment_125339">Add My Comment</button>
  <a href="#" class="cancel-reply">Cancel</a>
</form>

Text Content

SearchSecurity
Search the TechTarget Network
Sign-up now. Start my free, unlimited access.
Login Register
 * Techtarget Network
 * News
 * Features
 * Tips
 * More Content
    * Answers
    * Buyer's Guides
    * Definitions
    * Essential Guides
    * Opinions
    * Photo Stories
    * Podcasts
    * Quizzes
    * Tutorials
    * Sponsored Communities

 * Schools

 * SearchSecurity
 * Topic Risk management strategies
    * Data security
    * Identity and access management
    * Network security
    * Security training and jobs
    * Infosec programs
    * Information security threats
    * Network threat detection
    * Platform security
    * Security compliance
    * Software security
    * Web security tools
    * Wireless and mobile security
    * All Topics

 * SubTopic Vulnerability assessments
    * Vulnerability assessments
    * Risk assessments
    * Security awareness training
    * All Subtopics

 * Follow:
 * 
 * 
 * 



Nmedia - Fotolia

Nmedia - Fotolia

News Stay informed about the latest enterprise technology news and product
updates.


RISK & REPEAT: IS VULNERABILITY MARKETING PROBLEMATIC?

 * 1
 * 

By
 * Rob Wright, News Director

Published: Oct 26, 2017
Related Podcasts
 * Wireless hot spot security -- podcast
 * Risk & Repeat: Windows zero-day sparks disclosure debate
 * Risk & Repeat: More Symantec vulnerabilities emerge
 * Risk & Repeat: How bad is the httpoxy vulnerability?
 * View All Podcasts

Share this item with your network:


 * 
 * 
 * 

Listen to this podcast


In this week's Risk & Repeat podcast, SearchSecurity editors discuss
vulnerability marketing and compare how the recent KRACK attack and ROCA flaw
were publicized and promoted.

00:00
00:00
30:53


Podcast

Should security vulnerabilities be marketed like products? That was the question
after two major security flaws brought to light last week -- the KRACK attack
and the ROCA flaw -- offered a contrast in the practice of vulnerability
marketing.

While the KRACK attack, which exploits a vulnerability in the WPA2 protocol,
received more marketing and media attention, some infosec experts argued the
ROCA flaw, which affects RSA encryption in Infineon Technologies chips, was
equally, if not more serious than KRACK.

Both vulnerabilities were discovered primarily by security researchers at
universities, not by vendors. Yet, ROCA appeared to have taken a backseat to the
KRACK attack; the latter discovery benefited from vulnerability marketing
efforts, which included a dedicated website and promotional efforts to raise
awareness of the WPA2 flaw.

What are the potential drawbacks of vulnerability marketing? Should the
researchers that discovered the ROCA flaw have done more to promote their
findings, or is the infosec community treating vulnerabilities too much like
products? SearchSecurity editors Rob Wright and Peter Loshin discuss those
questions and more in this episode of the Risk & Repeat podcast.



Rob Wright asks:


HOW SHOULD THE INFOSEC INDUSTRY MARKET VULNERABILITY RESEARCH?

Join the Discussion

NEXT STEPS

Risk & Repeat: DEFCON warns of voting machine security issues

Risk & Repeat: The Kaspersky controversy continues

Risk & Repeat: Equifax, Yahoo breaches grow larger



JOIN THE CONVERSATION


1 COMMENT


Send me notifications when other members comment. Add My Comment

REGISTER

 *  * I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of
      my information to the United States for processing to provide me with
      relevant information as described in our Privacy Policy.
   
   Please check the box if you want to proceed.

 *  * I agree to my information being processed by TechTarget and its Partners
      to contact me via phone, email, or other means regarding information
      relevant to my professional interests. I may unsubscribe at any time.
   
   Please check the box if you want to proceed.



LOGIN

Forgot your password?

FORGOT YOUR PASSWORD?

No problem! Submit your e-mail address below. We'll send you an email containing
your password.
Submit

YOUR PASSWORD HAS BEEN SENT TO:

PLEASE CREATE A USERNAME TO COMMENT.

Oldest  Newest 
[-]

Rob Wright - 26 Oct 2017 11:51 AM
How should the infosec industry market vulnerability research?

Add My Comment Cancel
 *  




-ADS BY GOOGLE


LATEST TECHTARGET RESOURCES

 * Cloud Security
 * Networking
 * CIO
 * Enterprise Desktop
 * Cloud Computing
 * Computer Weekly


SEARCHCLOUDSECURITY


 * DEFINING AND EVALUATING SOC AS A SERVICE
   
   As cloud use increases, many enterprises outsource some security operations
   center functions. Evaluate if SOCaaS is the best ...


 * GET TO KNOW THE ELEMENTS OF SECURE ACCESS SERVICE EDGE
   
   Cloud services use cases continue to expand, but implementation challenges
   remain. Discover Secure Access Service Edge, or SASE, ...


 * BOOST SECURITY WITH A MULTI-CLOUD WORKLOAD PLACEMENT PROCESS
   
   IT must incorporate a multi-cloud workload placement process into its
   multi-cloud strategy in order to maintain or improve cloud ...


SEARCHNETWORKING


 * CORONAVIRUS: VPN HARDWARE BECOMES A CHOKEPOINT FOR REMOTE WORKERS
   
   VPN hardware has become a bottleneck for companies with a high number of
   employees working from home as a result of efforts to ...


 * DISCOVER KEY OPENSTACK DEPLOYMENT METHODS FOR NETWORKS
   
   In this book excerpt, explore best practices for OpenStack deployment
   methods, and glean expert advice on how to achieve an ...


 * BUSINESS CULTURE IS KEY IN OPENSTACK NETWORK REQUIREMENTS
   
   Network teams should expect a shift in their day-to-day routines if their
   organization embraces OpenStack. However, if the ...


SEARCHCIO


 * HOW RPA AND DIGITAL TRANSFORMATION WORK TOGETHER
   
   Enterprises that think RPA is a good endpoint for digital transformation
   efforts are in for a rude shock. While automation is a ...


 * HOW TO ENSURE CYBERSECURITY PLANS ALIGN WITH BC/DR PLANS
   
   It's crucial for organizations to have a collection of emergency-focused
   plans in place that can interact with each other if a ...


 * HOW TO NEGOTIATE A GOOD SOFTWARE SUBSCRIPTION AGREEMENT
   
   A big mistake IT execs make in negotiating software subscription deals is
   overbuying. Here are seven steps from ClearEdge ...


SEARCHENTERPRISEDESKTOP


 * CORONAVIRUS PANDEMIC: 5 REMOTE WORK TIPS FOR IT
   
   VMware's Shawn Bass and Brian Madden shared tips to help IT workers make
   remote work a reality for their organizations as the new...


 * HOW TO ENSURE THAT UEM SUPPORTS RUGGED DEVICE MANAGEMENT
   
   Rugged devices have different needs and requirements than the average device.
   Organizations should ensure that their UEM ...


 * COMPARE CAPABILITIES OF OFFICE 365 MDM VS. INTUNE
   
   Office 365 MDM and Intune both offer the ability to manage mobile devices,
   but Intune provides deeper management and security. ...


SEARCHCLOUDCOMPUTING


 * 6 AMAZON SAGEMAKER CAPABILITIES DEVELOPERS SHOULD KNOW ABOUT
   
   Developers and data scientists should familiarize themselves with these six
   SageMaker tools meant to simplify the machine ...


 * 7 TIPS TO MANAGE CLOUD SPRAWL IN YOUR ENTERPRISE
   
   Cloud sprawl can lead to all sorts of unwanted surprises. Review these
   recommendations to get control over all the cloud ...


 * WHAT TO MAKE OF AWS' MULTI-CLOUD STRATEGY, OR LACK THEREOF
   
   AWS eventually caved when it came to hybrid cloud. Some experts and partners
   say the same will happen with its multi-cloud ...


COMPUTERWEEKLY.COM


 * CORONAVIRUS PROMPTS CROSS-INDUSTRY COLLABORATION FROM DATACENTRE OPERATORS TO
   KEEP UK ONLINE
   
   TechUK positioning document reveals datacentre operators are putting their
   competitive differences aside to share best practice ...


 * CHUNGHWA TELECOM SELECTS NOKIA, ERICSSON FOR RAPID 5G BUILD-OUT
   
   Taiwanese operator taps Nordic comms giants for essential equipment in
   improving efficiency and user experience


 * SINGAPORE’S JTC TAPS GIS PLATFORM IN PUNGGOL DIGITAL DISTRICT
   
   The planners behind Singapore’s Punggol Digital District are using a
   geographic information system to make better planning ...

 * About Us
 * Meet The Editors
 * Contact Us
 * Privacy Policy
 * Videos
 * Photo Stories

 * Definitions
 * Guides
 * Advertisers
 * Business Partners
 * Media Kit
 * Corporate Site

 * Contributors
 * CPE and CISSP Training
 * Reprints
 * Archive
 * Events
 * E-Products

All Rights Reserved, Copyright 2000 - 2020, TechTarget

Do Not Sell My Personal Info

Arial
Arial Black
Comic Sans MS
Courier New
Narrow
Garamond
Georgia
Impact
Sans Serif
Serif
Tahoma
Trebuchet MS
Verdana
1
2
3
4
5
6
7

Paragraph


HEADER 1


HEADER 2


HEADER 3

HEADER 4

HEADER 5

HEADER 6


Enter URL:


Paste the code:



Close