VULNERABILITIES EQUITIES PROCESS: Difference between revisions
From osint.info
Jump to navigationJump to search
Line 12: | Line 12: | ||
|- | |- | ||
|20160804||schneier.com||[https://www.schneier.com/blog/archives/2016/08/more_on_the_vul.html More on the Vulnerabilities Equities Process]||[[VEP]] | |20160804||schneier.com||[https://www.schneier.com/blog/archives/2016/08/more_on_the_vul.html More on the Vulnerabilities Equities Process]||[[VEP]] | ||
|- | |||
|20160711||schneier.com||[https://www.schneier.com/blog/archives/2016/07/report_on_the_v.html Report on the Vulnerabilities Equities Process]||[[VEP]] | |||
|- | |- | ||
|} | |} |
Revision as of 19:30, 11 March 2017
Articles
Date | Source | Title | Tags |
20161116 | cyberlaw.stanford.edu | Government Hacking: Vulnerabilities Equities Process | VEP |
20160820 | fortune.com | Changing Face of Security: When Government Secrets Keep You Safe | VEP |
20160818 | lawfareblog.com | Cybersecurity: Everything You Know About the Vulnerability Equities Process Is Wrong | VEP |
20160804 | schneier.com | More on the Vulnerabilities Equities Process | VEP |
20160711 | schneier.com | Report on the Vulnerabilities Equities Process | VEP |