June 30, 2022, 1:20 a.m. | Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák

cs.CR updates on arXiv.org arxiv.org

Identification of cyber threats is one of the essential tasks for security
teams. Currently, cyber threats can be identified using knowledge organized
into various formats, enumerations, and knowledge bases. This paper studies the
current challenges of identifying vulnerabilities and threats in cyberspace
using enumerations and data about assets. Although enumerations are used in
practice, we point out several issues that still decrease the quality of
vulnerability and threat identification. Since vulnerability identification
methods are based on network monitoring and agents, …

challenges current cyber cyber threat identification public threat vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Operations Manager (f/d/m), 80-100%

@ Alpiq | Lausanne, CH

Project Manager - Cyber Security

@ Quantrics Enterprises Inc. | Philippines

Sr. Principal Application Security Engineer

@ Gen | DEU - Tettnang, Kaplaneiweg

(Senior) Security Architect Car IT/ Threat Modelling / Information Security (m/f/x)

@ Mercedes-Benz Tech Innovation | Ulm

Information System Security Officer

@ ManTech | 200AE - 375 E St SW, Washington, DC