Vulnerability Research

The process of finding and analyzing new vulnerabilities.

  • Through direct experimentation.

  • Through analysis of the architecture, code, or system behavior.

Important to many different stakeholders:

  • Product owners: prioritize actions/budget on the product lifecycle.

  • Developers: understand what created the vuln, and how it can be avoided.

  • Administrators: assess the impact and deploy defense/recovery measures.

  • Vulnerability Researchers: to pivot to new vulnerabilities.

Last updated