Application Security Burstiness Survival Curves

This figure shows three different survival curves. One for applications with a steady scanning cadence, one for applications with an irregular scanning cadence and one for applications with a bursty scanning cadence. Initially steady scanning reduces flaws more quickly and completely, but eventually Bursty scanning has roughly the same outcome. Irregular scanning closes fewer flaws.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.