cover

CVE and CVSS: What's the Difference?

CVE and CVSS are some of the most commonly misunderstood features of patching. In this article, we will explore the differences and showcase how they can affect your patching technique. Although many IT managers are familiar with these terms CVE and CVSS, some IT professionals still don’t understand the difference between them. CVE and CVSS are synonymous with software vulnerabilities, patching and operating systems. 

What is a Vulnerability Assessment?


The First Step in Cybersecurity and Software Vulnerability Remediation

Sealing the Patch Gap

“Patch Tuesday” is a term widely used between IT and security teams to describe the time when Microsoft releases the latest updates. The ones who participate in it know the true cost of the patching cycle, whether it’s getting the approval, designing the plan, or dealing with the outcome.

In: #patching

Predicting Vulnerabilities in Compiled Code

Prognosis: Vulnerability Proliferation

With the increase of software usage worldwide, it’s only natural that a growing number of vulnerabilities will be discovered.

1999 was the inflection point for vulnerability listings. Prior to that, a variety of security tools offered different ways to categorize software security issues. As there was no standardized protocol for listing a vulnerability, inconsistencies were inevitable. In that year, the concept of common vulnerability and exposure (CVE) was introduced as a standard to represent software security flaws.

In: #binary

Vulnerability Rich - Contextually Blind!

It’s not uncommon to find the traditional vulnerability assessment report buried under the CISO family picture, compliance books, and his latest blood pressure test. These reports highlight the never-ending battle between security and IT about what’s more important: risks to servers and endpoints, or keeping the environment up-to-date and secured. There are even problems within the ranks of each unit. Dysfunctional processes, lack of efficient communication, and rudimentary tools put even more pressure on the CIO and CISO.

There was a Drop in Vulnerability Disclosure, What's the Bad News?

As detection of backdoor vulnerabilities to the Android Operating System present increasingly lucrative potential, locating them has now become somewhat of a treasure hunt for hackers.

In: #cpe

What Exactly Happened with the Exim Vulnerability?

In September 2019, a vulnerability has been discovered in EXIM, an open-source mail transfer agent,
which is a program responsible for receiving, routing and delivering email messages.

In: #patching

Greatest Healthcare Data Breaches of 2019

Unfortunately, 2019 has been a big year for hackers. From January, cyberattacks have been impacting a countless number of individuals, especially within the Healthcare industry. With it being a big target, we have gathered some of the Greatest Healthcare Data Breaches of 2019.

In: #protect

Leave a Reply

    Categories

    See all

    Strong Cyber Hygiene is only One Click Away

    Want to take TOPIA for a free ride? Schedule A Meeting with our 🐺team!

    Let us know what would like to see 😀