VULNERABILITIES EQUITIES PROCESS: Difference between revisions
From osint.info
Jump to navigationJump to search
Line 10: | Line 10: | ||
|- | |- | ||
|20160818||lawfareblog.com||[https://www.lawfareblog.com/everything-you-know-about-vulnerability-equities-process-wrong Cybersecurity: Everything You Know About the Vulnerability Equities Process Is Wrong]||[[VEP]] | |20160818||lawfareblog.com||[https://www.lawfareblog.com/everything-you-know-about-vulnerability-equities-process-wrong Cybersecurity: Everything You Know About the Vulnerability Equities Process Is Wrong]||[[VEP]] | ||
|- | |||
|20160804||schneier.com||[https://www.schneier.com/blog/archives/2016/08/more_on_the_vul.html More on the Vulnerabilities Equities Process]||[[VEP]] | |||
|- | |- | ||
|} | |} |
Revision as of 19:30, 11 March 2017
Articles
Date | Source | Title | Tags |
20161116 | cyberlaw.stanford.edu | Government Hacking: Vulnerabilities Equities Process | VEP |
20160820 | fortune.com | Changing Face of Security: When Government Secrets Keep You Safe | VEP |
20160818 | lawfareblog.com | Cybersecurity: Everything You Know About the Vulnerability Equities Process Is Wrong | VEP |
20160804 | schneier.com | More on the Vulnerabilities Equities Process | VEP |