How Lucrative Are Vulnerabilities? A Closer Look At The Economics Of The Exploit Supply Chain
By Tenable
Added
This report is intended for CISOs, security managers and security practitioners who are familiar with vulnerabilities and zero days and want a deeper understanding of the market dynamic driving their discovery and dissemination. It explores the vulnerabilities-to-exploit (V2E) cybercrime and cybersecurity supply chain, outlines the players in the different market segments and provides insights into the related economic drivers.
Tags
Vulnerability Cybercrime market 3rd party services Pen testing Bug bounty Extortion Confidentiality Criminal group Security incident State actorTopic Map
