# Vulnerability Management

Blog

What is Virtual Patching?

Dec 10, 2021

Recent Posts

By Kent Weigle
Dec 09, 2021

What is Patch Management?

Patch management is the process of acquiring, testing and installing updates on computers. It is mostly done by organizations as part of their internal efforts to fix issues with the different versions of software programs. Additionally, patch management also helps to evaluate existing software programs and detect any potential lack of security features.

By Kent Weigle
Dec 31, 2021

A Step in the Right Direction – Binding Operation Directive 22-01

On November 3rd, 2021, the Cybersecurity and Infrastructure Security Agency released Binding Operational Directive 22-01, a compulsory direction with the goal of systematizing and standardizing vulnerability remediation across federal agencies except for defined “national security systems” and “certain systems operated by the Department of Defense or Intelligence Community.”

By Kent Weigle
Dec 09, 2021

What is Configuration Management?

Configuration management is an essential foundation for a successful technology platform. Leaders in the tech space will want to know what it takes to implement it. If that’s what you are searching for, we will discuss some important points in this article:

By Kent Weigle
Dec 09, 2021

What is Automated Patching?

The easiest way to fix known vulnerabilities is through patching. The major challenges are often gaining approval from app owners and in executing the change approval process.

By Kent Weigle
Dec 09, 2021

What is Risk-Based Vulnerability Management?

Risk-based vulnerability management is the process of reducing vulnerabilities across the attack surface of an organization’s assets by prioritizing remediation based on the risks they pose. 

By Evan Kling
Dec 20, 2021

Vicarius Offers New Technology To Fix Log4j With No Vendor Involvement

 

By Kent Weigle
Dec 15, 2021

Vicarius & Log4Shell: What You Need to Know

Has Vicarius Been Affected by Log4Shell?

Along with the rest of the cybersecurity community, we have been continuously monitoring for any evidence of Log4Shell exploit attempts in our digital environment. So far, we have found no evidence that TOPIA or any of our systems have been affected by CVE-2021-44228 or CVE-2021-45046. It is also our current understanding that we are not vulnerable to either CVEs according to data gathered from extensive testing.

By Kent Weigle
Nov 04, 2021

Nmap Best Practices

What is Nmap?

Nmap is one of the most popular free network scanning tools available on the market today. For many years, the software has become a core program for network administrators and IT professionals who want to map out their network and conduct a wide range of network inventories. It also allows the user to find live hosts on their network systems and scan for open ports and operating systems. 

By Kent Weigle
Dec 08, 2021

Vicarius Launches MacOS Patching Capability

There’s a patch for that.

By Kent Weigle
Nov 04, 2021

Is Nmap Safe?

Nmap is a network scanning tool that can scan large networks as well as single hosts quickly. Network administrators normally use it to identify the devices that are currently running on the system, the port number on which the devices are connected and the free ports that can be used.

By Kent Weigle
Nov 04, 2021

Top Nmap Commands for System Admins

Network Mapper (Nmap) is an open-source Linux command-line tool for network exploration and security auditing. With Nmap, server administrators can reveal services and hosts quickly, scan for open ports and search for security issues. The Nmap tool can assess and discover local and remote open ports as well as network information and hosts.

By Kent Weigle
Nov 03, 2021

How to Use Nmap

The most common issue with Internet systems is that they are too complex for the ordinary person to understand. Also, a small home-based system may be complex for some people. Consequently, when it comes to bigger agencies and large organizations that deal with lots of computers on the network, the complexity will increase.

Therefore, to learn which ports are open and the rules of engagement, a program called Nmap can be used. It’s a network scanning tool available for IT administrators, network administrators, systems administrators and other IT professionals. 

By Kent Weigle
Nov 03, 2021

What is Nmap?

Nmap is one of the most used tools for network scanning. Its ease of use and effective installation with exceptional scanning options makes it popular in the IT industry. This article will give you a comprehensive understanding of the tool and let IT professionals, IT administrators and network administrators scan networks with ease to discover vulnerabilities.

By Kent Weigle
Oct 16, 2021

Three Essential Steps for Vulnerability Remediation

Vulnerability remediation involves the fixing or patching of cybersecurity weaknesses that are detected in applications, networks and enterprise assets. Before, vulnerability remediation was a manual procedure. Nowadays, it’s more automated with advanced threat intelligence, data science and predictive algorithms assisting security professionals to know which vulnerabilities should be remediated first.

By Kent Weigle
Nov 02, 2021

The Hazards of Third-Party Code

The use of third-party code has become essential to software development. Available as open-source or off-the-shelf, this third-party code shortens production time and costs, while enabling developers to focus on client specific features. These pre-packaged bundles of code might seem like a boon, but they can lead to headaches, negative financial impact, and loss of client trust.