I saw another great report from Chainguard on vulnerability management specifically for dealing with public CVEs in containers. It’s wild to see the trend of challenges and time commitments for remediation. Check out their report: https://lnkd.in/giRTGmqY
John Hammond’s Post
More Relevant Posts
-
Finally got a new post up! Some thoughts about Vulnerability Management and continuous improvement... two topics near and dear to my heart. https://lnkd.in/enyJBBk4
To view or add a comment, sign in
-
Crafting an effective insider threat incident response plan is essential for early detection and minimizing impact – and can be the difference between a controlled incident and full-blown crisis. Learn how to build a plan that protects your assets. https://hubs.ly/Q02YqPfm0
To view or add a comment, sign in
-
Your management is not interested in you whining about critical this, critical that. They want to see progress in the reduction of the attack surface. This requires a completely different approach to OT vulnerability management than you have been told. https://lnkd.in/eBSKsCaM
To view or add a comment, sign in
-
Elevate your cybersecurity game. Read ENDUIR Cyber latest blog post to discover actionable insights for effective vulnerability management!
With the end of the year upon us, now is a great time to think about your company's vulnerability management program. We've summarized the common pitfalls we see and some recommended enhancements in the article below. Michael Chada, Austin Fields, and Jordan L. welcome any questions or discussion related to the topic!
To view or add a comment, sign in
-
With the end of the year upon us, now is a great time to think about your company's vulnerability management program. We've summarized the common pitfalls we see and some recommended enhancements in the article below. Michael Chada, Austin Fields, and Jordan L. welcome any questions or discussion related to the topic!
To view or add a comment, sign in
-
Common pitfalls in vulnerability management…any you can identify with in your organization?
With the end of the year upon us, now is a great time to think about your company's vulnerability management program. We've summarized the common pitfalls we see and some recommended enhancements in the article below. Michael Chada, Austin Fields, and Jordan L. welcome any questions or discussion related to the topic!
To view or add a comment, sign in
-
Vulnerability Management is finishing. Time for Continuous Threat and Exposure Management - https://lnkd.in/duBevp-d
To view or add a comment, sign in
-
Which would you rather know -- if a CVE might impact your installed base or if it ACTUALLY does? OTbase only shows you what CVEs you face. No more false-positive freakouts. Check out the OT Vulnerability Management Handbook. https://hubs.la/Q02GYfY50
To view or add a comment, sign in
-
In a Vulnerability Management Program, there are a lot of aspects to consider apart from scanning and vulnerability tools. I have identified some. What aspects do you see? Thank you Matthias Rohr for the hint of "Ownership", which is not the same as the definition of roles.
To view or add a comment, sign in
Security Operation analyst
5moJohn Hammond can we please connect, i have located a new bug in M365 resulting in MFA takeover.