# Vulnerability Management

Blog

image

CVSS: The Vulnerability Dartboard

Dec 16, 2020

Recent Posts

image
By Michael Assraf
Jan 14, 2021

The Wolf Pack Keeps Growing 😅🐺🧠

Say it ain't so! (Oh, I'll say it! 😜)

image
By Michael Assraf
Jan 14, 2021

The Wolf Pack is Growing 🧠🐺

The pack just got a little larger 😎

image
By Kent Weigle
Dec 16, 2020

What is CVSS Severity?

The Common Vulnerability Scoring System (CVSS) offers a way to capture the major features of a vulnerability and produce a numerical score showcasing its severity. The numerical score can then be translated into a qualitative representation such as low, medium, high and critical to assist companies to effectively assess and prioritize their vulnerability management processes.

image
By Kent Weigle
Dec 15, 2020

The Past, Present, and Future of the CVSS

The Common Vulnerability Scoring System (CVSS) offers a way for companies to assess the fundamental features of a vulnerability and produce a numerical score showcasing its severity. The CVSS has proven to be beneficial to assess vulnerabilities and to standardize security policies. But, it has also shown some inadequacies in addressing the needs of users outside of traditional IT environments. 

image
By Kent Weigle
Dec 15, 2020

Measuring the Severity of Vulnerabilities: Changes in CVSS 3.1

Common Vulnerability Scoring System (SVSS) version 3.0 framework was the last one that was published by the organization responsible for creating it. It was created by the Forum of Incident Response and Security Teams (FIRST). 

image
By Kent Weigle
Dec 17, 2020

What are CVSS scores?

Understanding Vulnerability Scoring

Threat actors make use of vulnerabilities for their attacks. By exploiting vulnerabilities, attackers can gain access to devices, networks and systems. Vulnerabilities enable attackers to steal corporate information and sell sensitive information. They can also eavesdrop to confidential communication.   

image
By Kent Weigle
Dec 14, 2020

Will CVSS v3 Change Everything?

Common Vulnerability Scoring System (CVSS) allows companies to make use of a common language when dealing with vulnerability threats. Since it was created in 2003, CVSS has been widely implemented by many companies. 

image
By Kent Weigle
Dec 23, 2020

Security Terms for 400

"The day when Microsoft releases updates for their software to improve security."

What is...Patch Tuesday

image
By Michael Assraf
Jan 11, 2021

Beyond Security Announces Technology Partnership with Vicarius

Sacramento, CA - Beyond Security, a global leader in automated penetration testing and vulnerability scanning, today announced their technology partnership with Vicarius, an Israel-based vulnerability prioritization, and remediation company. This partnership will extend the detection and response capabilities of beSECURE by leveraging Vicarius’ TOPIA 0-day analysis engine, usage-based threat prioritization, and patchless protection for an all-in-one threat mitigation solution.

image
By Kent Weigle
Dec 15, 2020

Breaking Down the Common Vulnerability Scoring System

Vulnerability is a weakness in software, hardware, procedures or personnel. But, not all vulnerabilities are the same. Some vulnerability has system administrators scrambling to deploy a patch, while some are not worth fixing. 

image
By Michael Assraf
Dec 08, 2020

Automated Vulnerability Remediation - The Good, the Bad, and the Ugly

The way we identify, prioritize, and mitigate software vulnerabilities was built in reverse order. Why did it happen? How can we make things different?

image
By Kent Weigle
Dec 16, 2020

How Does CVSS Scoring Work?

The Common Vulnerability Scoring System (CVSS) offers software developers, security and IT experts with a standardized process for evaluating vulnerabilities. CVSS can be used to evaluate the threat level of each vulnerability and then prioritize mitigation accordingly. This article explains the way CVSS works, which includes a review of its components and describes the importance of using a standardized process for evaluating vulnerabilities.

image
By Shani Dodge Reiner
Dec 10, 2020

Generating Threat Insights Using Data Science

As the amount of cyber crime and cyber damage grows over time, the need for protecting assets and organizations is paramount. 

image
By Kent Weigle
Dec 22, 2020

Security Vulnerability Examples

As the threat landscape changes, the ability to address the most common types of security vulnerabilities is vital for robust protection. As information becomes the most essential asset for an organization, cybersecurity gains much more importance. To successfully conduct your business and preserve the hard-earned reputation of your company, you need to protect your data from malicious attacks, data breaches and hackers. 

image
By Kent Weigle
Dec 22, 2020

Zoom Security Vulnerabilities

As if times haven’t been hard enough, businesses are dealing with new security threats while employees work from home and some have major issues with one of the most popular video conferencing platforms, Zoom.