Request a Demo

05.29.2019 | AWS Lambda , Linux , Patch Managment

Posted by Roy Horev
Amazon released the EC2 Run Command in 2015 as the first step to extend a bridge back to datacenter, enterprise, and traditional operations ...
Read more

05.23.2019 | vulnerabilities , Pen Testing

Posted by Roy Horev
For an organization to be confident it must have a solid security posture, and for this, regular testing is key. Two types of testing are critical to ...
Read more

05.14.2019 | vulnerabilities

Posted by Roy Horev
In the broadest sense, “Asset Management” means managing the complete life-cycle of every corporate asset, from procurement to safe disposal. ...
Read more

05.7.2019 | vulnerabilities

Posted by Tal Morgenstern
There’s a buzz in the vulnerability market surrounding solutions to protect against Zero Day vulnerabilities - vulnerabilities that were previously ...
Read more
The number of vulnerabilities uncovered daily has long exceeded what security teams can possibly address. The key to success in vulnerability ...
Read more

04.23.2019 | Patching , vulnerabilities

Posted by Tal Morgenstern
With over 1,600 new vulnerabilities reported in the first 100 days of 2019, in addition to the 17,308 reported in 2018, it’s clear that vulnerability ...
Read more

04.4.2019 | vulnerability remediation

Posted by Roy Horev
Vulnerability remediation was once considered a straightforward process. Scanning software identified potential vulnerabilities and notified the ...
Read more
Enterprises face new security threats daily. In 2017-18 alone, over 30,000 new vulnerabilities were reported. Trying to adapt to this new reality has ...
Read more
It’s the question that plagues every CISO: “Have I done enough?” First, you’ve convinced your partners in the boardroom that vulnerabilities are a ...
Read more

03.14.2019 | vulnerabilities , Cybersecurity

Posted by Roy Horev
The number of known vulnerabilities has exploded in recent years. With enterprises using more software solutions, open-source, cloud, Internet of ...
Read more
Everyone knows that CISOs are losing sleep over the dangers that vulnerabilities could potentially cause their businesses, and with good reason. But ...
Read more

02.27.2019 | Patching

Posted by Ortal Keizman
So, it’s time to patch again. Kind of like getting your flu shots – you know it’s good for you, but nobody likes doing it. Let’s do a quick analysis ...
Read more
“If it were easy, everyone would do it.” With the never-ending headlines of major breaches caused by vulnerabilities, it’s clear that vulnerability ...
Read more

02.12.2019 | Cybersecurity

Posted by Roy Horev
No matter what IT field you work in, staying on top of the latest technologies and trends is a must, especially in cybersecurity. Just as a good ...
Read more
Security and IT teams are currently fighting a flood of software vulnerabilities. In 2018 alone, a record 16,555 were reported. Of these, thousands ...
Read more
  It's been over a year since the Equifax breach made headline news. But I have the feeling that organizations haven't looked at the Equifax breach ...
Read more

01.23.2019 | Patching

Posted by Roy Horev
  On the surface, patch management sounds like a straightforward task. But patching in a production environment means making a change to potentially ...
Read more
Posted by Natalie Kriheli
For our day to day product deployment, we use docker containers. Whenever a new piece of code is being shipped to production, our CI/CD process ...
Read more
Knowing what NOT to do can sometimes be just as helpful as knowing the right thing to do. Oftentimes, CISOs and Vulnerability Managers have plans and ...
Read more

12.27.2018 | DevSecOps , Cybersecurity

Posted by Roy Horev
DevOps has revolutionized the pace at which new iterations of applications are released to meet the needs of customers. By nature, security teams are ...
Read more

12.20.2018 | vulnerabilities

Posted by Roy Horev
Trends in vulnerabilities and threats evolve as the technology landscape changes. The vulnerability landscape has changed tremendously over the last ...
Read more
By now, everybody knows that vulnerabilities that aren't remediated properly could pose a serious threat to the enterprises environment.The data ...
Read more
With the end of the year, it’s prime time to reflect on vulnerability trends since the start of the decade.
Read more
However you flip the number of recorded vulnerabilities in a given year, the number is at once humbling and noteworthy. We know that both actions – ...
Read more

11.1.2018 | vulnerabilities

Posted by Roy Horev
The best way to share information about the risks associated with vulnerabilities is via quantifying these risks – i.e. metrics. The question is, ...
Read more
A key part of any risk assessment framework, vulnerability intelligence enables organizations to consider the broader picture when assessing a given ...
Read more

10.17.2018 | vulnerabilities

Posted by Roy Horev
  While technology companies aim to ensure that their products are watertight, the fact of the matter is that security vulnerabilities are ...
Read more

10.11.2018 | vulnerabilities

Posted by Roy Horev
The question of remediating every single vulnerability is moot. Given the massive amounts of vulnerabilities being disclosed every month, it’s ...
Read more
  As a CISO or Security Manager, you understand your organization’s need to remain one step ahead of cybercriminals searching for gaps in your ...
Read more

09.26.2018 | Patching

Posted by Tal Morgenstern
  The 15th anniversary of Patch Tuesday is coming up, and now is a good time to rethink how we approach patching as a whole, and how we prepare for ...
Read more
  In its 2018 “Global Risks Report,” the World Economic Forum – a prominent international policy think-tank – ranked cyber threats just below extreme ...
Read more

09.5.2018 | DevSecOps

Posted by Roy Horev
  The demanding speed of today’s development cycles and flexibility of IT infrastructure provides a huge opportunity to move faster not only for the ...
Read more

08.28.2018 | Cybersecurity

Posted by Yaniv Bar-Dayan
   Figuring out the best way to leverage the cyber risk landscape with growing numbers of vulnerabilities every day is a daunting task, to say the ...
Read more

08.21.2018 | DevSecOps

Posted by Roy Horev
  DevOps took the software scene by storm in 2008, with the promise to reduce the time between changing a software system and that change being ...
Read more
  For several months in early 2018, you could not open a browser without seeing news about Spectre and Meltdown – the variants of a vulnerability ...
Read more
  With proper cyber hygiene, you can control IT processes - rather than being controlled by endless (and unhygienic) vulnerabilities.
Read more
Just five years ago, the vulnerability landscape looked markedly different. There were fewer vulnerabilities to patch and risk was far lower - since ...
Read more
  As we discussed in a previous post, a tsunami of known vulnerabilities is flooding businesses worldwide. In fact, the number of vulnerabilities ...
Read more
  With nearly 15,000 new vulnerabilities discovered in 2017, and even more expected this year – the competition for ‘worst vulnerability’ is a tough ...
Read more
  There’s no other way to state it: Existing vulnerability management processes are broken. Current vulnerability management paradigms are not ...
Read more
  According to CVE Details, the number of vulnerabilities reported to date in 2018 (6559) already tops the total number of vulnerabilities reported ...
Read more

06.21.2018 | Drupal , Patching

Posted by Guy Bratman
  On March 27th 2018, the Drupal CMS team announced a massive vulnerability dubbed ‘Drupalgeddon 2’. Accordingly, they recommended that “Drupal site ...
Read more
  “Don’t wake a sleeping lion.” This was the reaction my two co-founders Tal Morgenstern, Roy Horev, and I had gotten over and over again when ...
Read more
pAKMEN1

Don’t miss out on the latest

Stay up to date on the latest in Vulnerability Remediation.
We promise not to spam you