You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This text is from David Brumley in the GSD call. Most of this should be added to the GSD site.
Difference between what our website says and what we say on calls (David Brumley):
The vulnerability landscape is evolving, with many sources of new information, often in their own proprietary format.
The GSD solves three problems in the current vulnerability management landscape:
Ensure parsability for machine automation
Aggregate vulnerability information from authorities
Provide a feed of issues that impact security but may not be in an authority stream, such as results from fuzzing campaigns, malicious software masquerading as good software, and similar.
GSD allows you to make sense of vulnerabilities across vulnerability authorities, security findings, and other threat feeds. Think of it as a machine-parsable modern version of the 1990's bugtraq mailing list.
How to use this: (these are our personas)
If you have sources of new vulnerability information:
If you wish to report a security finding:
If you want to consume the feed for your own projects and products:
The text was updated successfully, but these errors were encountered:
joshbuker
transferred this issue from CloudSecurityAlliance/gsd-project
Feb 1, 2023
ninjapanzer
changed the title
Update GSD website
Improve GSD Project description, who should be interested, and how it adds to the landscape to the GSD Website
Feb 7, 2023
This text is from David Brumley in the GSD call. Most of this should be added to the GSD site.
Difference between what our website says and what we say on calls (David Brumley):
The vulnerability landscape is evolving, with many sources of new information, often in their own proprietary format.
The GSD solves three problems in the current vulnerability management landscape:
GSD allows you to make sense of vulnerabilities across vulnerability authorities, security findings, and other threat feeds. Think of it as a machine-parsable modern version of the 1990's bugtraq mailing list.
How to use this: (these are our personas)
If you have sources of new vulnerability information:
If you wish to report a security finding:
If you want to consume the feed for your own projects and products:
The text was updated successfully, but these errors were encountered: