Request a Demo

Roy Horev

Recent Posts

05.23.2019 | vulnerabilities , Pen Testing

Posted by Roy Horev
For an organization to be confident it must have a solid security posture, and for this, regular testing is key. Two types of testing are critical to ...
Read more

05.14.2019 | vulnerabilities

Posted by Roy Horev
In the broadest sense, “Asset Management” means managing the complete life-cycle of every corporate asset, from procurement to safe disposal. ...
Read more

04.4.2019 | vulnerability remediation

Posted by Roy Horev
Vulnerability remediation was once considered a straightforward process. Scanning software identified potential vulnerabilities and notified the ...
Read more

03.14.2019 | vulnerabilities , Cybersecurity

Posted by Roy Horev
The number of known vulnerabilities has exploded in recent years. With enterprises using more software solutions, open-source, cloud, Internet of ...
Read more
Everyone knows that CISOs are losing sleep over the dangers that vulnerabilities could potentially cause their businesses, and with good reason. But ...
Read more
“If it were easy, everyone would do it.” With the never-ending headlines of major breaches caused by vulnerabilities, it’s clear that vulnerability ...
Read more

02.12.2019 | Cybersecurity

Posted by Roy Horev
No matter what IT field you work in, staying on top of the latest technologies and trends is a must, especially in cybersecurity. Just as a good ...
Read more
Security and IT teams are currently fighting a flood of software vulnerabilities. In 2018 alone, a record 16,555 were reported. Of these, thousands ...
Read more

01.23.2019 | Patching

Posted by Roy Horev
  On the surface, patch management sounds like a straightforward task. But patching in a production environment means making a change to potentially ...
Read more

12.27.2018 | DevSecOps , Cybersecurity

Posted by Roy Horev
DevOps has revolutionized the pace at which new iterations of applications are released to meet the needs of customers. By nature, security teams are ...
Read more

12.20.2018 | vulnerabilities

Posted by Roy Horev
Trends in vulnerabilities and threats evolve as the technology landscape changes. The vulnerability landscape has changed tremendously over the last ...
Read more

11.1.2018 | vulnerabilities

Posted by Roy Horev
The best way to share information about the risks associated with vulnerabilities is via quantifying these risks – i.e. metrics. The question is, ...
Read more

10.17.2018 | vulnerabilities

Posted by Roy Horev
  While technology companies aim to ensure that their products are watertight, the fact of the matter is that security vulnerabilities are ...
Read more

10.11.2018 | vulnerabilities

Posted by Roy Horev
The question of remediating every single vulnerability is moot. Given the massive amounts of vulnerabilities being disclosed every month, it’s ...
Read more
  In its 2018 “Global Risks Report,” the World Economic Forum – a prominent international policy think-tank – ranked cyber threats just below extreme ...
Read more

09.5.2018 | DevSecOps

Posted by Roy Horev
  The demanding speed of today’s development cycles and flexibility of IT infrastructure provides a huge opportunity to move faster not only for the ...
Read more

08.21.2018 | DevSecOps

Posted by Roy Horev
  DevOps took the software scene by storm in 2008, with the promise to reduce the time between changing a software system and that change being ...
Read more
  With nearly 15,000 new vulnerabilities discovered in 2017, and even more expected this year – the competition for ‘worst vulnerability’ is a tough ...
Read more
pAKMEN1

Don’t miss out on the latest

Stay up to date on the latest in Vulnerability Remediation.
We promise not to spam you