-
Please add Srikanth Vuppala to the teams page under an "R&D" section if it doesn't already exist with this image and description:
![Image](https://github.com/threat-zero/market/assets/42819936/b4974…
-
-
See also [Trello board](https://trello.com/c/bcoWOo9E/10-ccdr-dev)
# OBJECTIVES
`Updated 07/2023`
More efficient spatial processing to work on large countries at high resolution, with better …
-
There is a new test instance of cve.org which allows allocation/publication etc which would be useful for testing purposes.
-
We currently have a User Device Assessment method, a Network Mapping method, and a Vulnerability Scanning method. As has been discussed in a few fora, part of the "MVA" process @kakron has been workin…
-
It looks like you only allow a single IP address when performing Network scans. This won't scale much at all..
Additionally, when a new Network project is created and a nessus scan is uploaded all…
-
## Use case
When you want to see the CPEs associated with a vulnerability or vice versa.
## Current Workaround
There is no workaround.
## Proposed Solution
When importing the CVEs datas…
-
The following references may need to be added to Security and Privacy Guidelines:
* [SP 800-53 Rev. 5 - Security and Privacy Controls for Information Systems and Organizations](https://csrc.nist.gov/…
-
Data produced by the R5 project by GFDRR
### Countries (9)
- Capo Verde
- Ethiopia
- Kenya
- Malawi
- Mali
- Mozambique
- Niger
- Senegal
- Uganda
### Data types
- Exposure datasets …
-
Security is of critical importance to Adoptium in order to maintain the trust of its community in the integrity of the work that it does. There are evolving market requirements for software providers …