Request a Demo

05.7.2019 | vulnerabilities

Posted by Tal Morgenstern
There’s a buzz in the vulnerability market surrounding solutions to protect against Zero Day vulnerabilities - vulnerabilities that were previously ...
Read more
The number of vulnerabilities uncovered daily has long exceeded what security teams can possibly address. The key to success in vulnerability ...
Read more

04.23.2019 | Patching , vulnerabilities

Posted by Tal Morgenstern
With over 1,600 new vulnerabilities reported in the first 100 days of 2019, in addition to the 17,308 reported in 2018, it’s clear that vulnerability ...
Read more
Enterprises face new security threats daily. In 2017-18 alone, over 30,000 new vulnerabilities were reported. Trying to adapt to this new reality has ...
Read more
It’s the question that plagues every CISO: “Have I done enough?” First, you’ve convinced your partners in the boardroom that vulnerabilities are a ...
Read more

03.14.2019 | vulnerabilities , Cybersecurity

Posted by Roy Horev
The number of known vulnerabilities has exploded in recent years. With enterprises using more software solutions, open-source, cloud, Internet of ...
Read more
Everyone knows that CISOs are losing sleep over the dangers that vulnerabilities could potentially cause their businesses, and with good reason. But ...
Read more
“If it were easy, everyone would do it.” With the never-ending headlines of major breaches caused by vulnerabilities, it’s clear that vulnerability ...
Read more
Security and IT teams are currently fighting a flood of software vulnerabilities. In 2018 alone, a record 16,555 were reported. Of these, thousands ...
Read more
  It's been over a year since the Equifax breach made headline news. But I have the feeling that organizations haven't looked at the Equifax breach ...
Read more
Knowing what NOT to do can sometimes be just as helpful as knowing the right thing to do. Oftentimes, CISOs and Vulnerability Managers have plans and ...
Read more

12.20.2018 | vulnerabilities

Posted by Roy Horev
Trends in vulnerabilities and threats evolve as the technology landscape changes. The vulnerability landscape has changed tremendously over the last ...
Read more
With the end of the year, it’s prime time to reflect on vulnerability trends since the start of the decade.
Read more
However you flip the number of recorded vulnerabilities in a given year, the number is at once humbling and noteworthy. We know that both actions – ...
Read more

11.1.2018 | vulnerabilities

Posted by Roy Horev
The best way to share information about the risks associated with vulnerabilities is via quantifying these risks – i.e. metrics. The question is, ...
Read more
A key part of any risk assessment framework, vulnerability intelligence enables organizations to consider the broader picture when assessing a given ...
Read more

10.17.2018 | vulnerabilities

Posted by Roy Horev
  While technology companies aim to ensure that their products are watertight, the fact of the matter is that security vulnerabilities are ...
Read more

10.11.2018 | vulnerabilities

Posted by Roy Horev
The question of remediating every single vulnerability is moot. Given the massive amounts of vulnerabilities being disclosed every month, it’s ...
Read more
  As a CISO or Security Manager, you understand your organization’s need to remain one step ahead of cybercriminals searching for gaps in your ...
Read more
  With proper cyber hygiene, you can control IT processes - rather than being controlled by endless (and unhygienic) vulnerabilities.
Read more
  With nearly 15,000 new vulnerabilities discovered in 2017, and even more expected this year – the competition for ‘worst vulnerability’ is a tough ...
Read more
pAKMEN1

Don’t miss out on the latest

Stay up to date on the latest in Vulnerability Remediation.
We promise not to spam you