can vulnerabilities be treated differently based on ceratin circumstances? [duplicate]

We are running vulnerability scans on our systems. I can see a few XSS vulnerabilities being reported, such as CVE-2020-14173. Let me quote:

The file upload feature in Atlassian Jira Server and Data Center in
affected versions allows remo… Continue reading can vulnerabilities be treated differently based on ceratin circumstances? [duplicate]

Cybersecurity Lessons from the Pandemic: Perception of Risk

The more “mature” among us may recall when decision-making under uncertainty was based on the concept of “rational economic man.” We estimated or calculated the probability and amount of a loss (or gain) of various courses of action, multiplied the num… Continue reading Cybersecurity Lessons from the Pandemic: Perception of Risk

Are security controls themselves considered assets (e.g., cryptographic keys)

Looking at a plain system (there are no security controls implemented yet), we need to think about its functions and derive appropriate assets which we’d like to protect in order to ensure the system continues to function as intended (also… Continue reading Are security controls themselves considered assets (e.g., cryptographic keys)

Cybersecurity Lessons from the Pandemic: Models and Predictions

There are a number of different types of models—and the output from each must be viewed and used differently depending on the form of the model. First, you have relationships derived from correlations—they show how one variable changes in concert with … Continue reading Cybersecurity Lessons from the Pandemic: Models and Predictions