CISA’s Known Vulnerabilities Impact 15M Public Services

CISA’s Known Exploited Vulnerabilities (KEV) catalog is the authoritative source of information on past or currently exploited vulnerabilities. In a new report, the Rezilion research team analyzed vulnerabilities in the current KEV catalog. The results revealed a whopping 15 million vulnerable instances. And the majority of the occurrences were Microsoft Windows instances. Rezilion notes that […]

The post CISA’s Known Vulnerabilities Impact 15M Public Services appeared first on Security Intelligence.

Continue reading CISA’s Known Vulnerabilities Impact 15M Public Services

CISA or CVSS: How Today’s Vulnerability Databases Work Together

In the cybersecurity field, large databases of known threats and vulnerabilities have often been an essential resource. These catalogs show you where to focus your efforts. They’re also a good tool for prioritizing patches to increase security and mitigate the risk of disaster. As a result, these databases need to be reliable and up-to-date and […]

The post CISA or CVSS: How Today’s Vulnerability Databases Work Together appeared first on Security Intelligence.

Continue reading CISA or CVSS: How Today’s Vulnerability Databases Work Together

Vulnerability Management: How a Risk-Based Approach Can Increase Efficiency and Effectiveness

Security professionals keep busy. Before you can patch a vulnerability, you need to decide how important it is. How does it compare to the other problems that day? Choosing which jobs to do first using vulnerability management tools can be a key element of a smart security strategy. Software vulnerabilities are one of the root […]

The post Vulnerability Management: How a Risk-Based Approach Can Increase Efficiency and Effectiveness appeared first on Security Intelligence.

Continue reading Vulnerability Management: How a Risk-Based Approach Can Increase Efficiency and Effectiveness

To Rank or Not to Rank Should Never Be a Question

Scanning is an important part of any vulnerability management program, but it should always be accompanied by vulnerability ranking to ensure teams are patching the most impactful issues first.

The post To Rank or Not to Rank Should Never Be a Question appeared first on Security Intelligence.

Continue reading To Rank or Not to Rank Should Never Be a Question

How Do You Measure the Success of Your Patch Management Efforts?

With the recent shift in attack focus toward operating systems and the increase in publicized breaches and ransomware attacks, patch management is now essential for organizations.

The post How Do You Measure the Success of Your Patch Management Efforts? appeared first on Security Intelligence.

Continue reading How Do You Measure the Success of Your Patch Management Efforts?

How to Identify, Prioritize and Remediate Your Biggest Security Vulnerabilities

By prioritizing security vulnerabilities based on weaponization and asset value, you can address them in manageable workloads and remediate the most critical ones first.

The post How to Identify, Prioritize and Remediate Your Biggest Security Vulnerabilities appeared first on Security Intelligence.

Continue reading How to Identify, Prioritize and Remediate Your Biggest Security Vulnerabilities

Why You Need Full Visibility to Manage Common Vulnerabilities and Exposures (CVE)

The volume of CVE data is rapidly growing, and security teams need continuous visibility into their assets and associated risks to stay on top of emerging threats.

The post Why You Need Full Visibility to Manage Common Vulnerabilities and Exposures (CVE) appeared first on Security Intelligence.

Continue reading Why You Need Full Visibility to Manage Common Vulnerabilities and Exposures (CVE)