The cyber security industry is embracing and standardizing on the MITRE ATTACK framework, and concurrently we understand that vulnerability management by itself is not enough. We must combine risk-based vulnerability management with MITRE ATT&CK to expand our visibility and control of CVEs. This white paper explores how the Vulcan Cyber Voyager18 research team mapped relevant mitigation techniques to CVEs through machine learning and textual analysis.
We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.
View more