About This Training
Understanding the exposure of your embedded systems to cybersecurity threats requires analysis of a continuous stream of vulnerabilities and how they apply to a product.
But which vulnerabilities apply to your software components? How big of a risk do specific CVEs pose to your product? Which have the greatest chance of being exploited
in deployment? Which ones put your customers at the greatest risk of a security breach?
Emergency room doctors triage patients to determine whom to help first. Similarly, a vulnerability triage process enables your team to understand which vulnerabilities
need to be fixed first.
This training explores best practices for answering these questions using this process.