via wordfence.com => original post link
Prior to joining the Wordfence Threat Intelligence team, I spent several years as a vulnerability analyst, responsible for collecting, analyzing, and curating every publicly disclosed vulnerability. This meant collecting vulnerability information from almost a hundred different, disparate sources. As you can imagine, this was quite the challenge as each and every data source came with its own set of quirks:
Were we legally allowed to use the data in our own product?
Did we need special authentication/authorization to access the data?