This voluntary guidance provides an overview of product security bad practices that are deemed exceptionally risky, particularly for software manufacturers who produce software used in service of critical infrastructure or national critical functions (NCFs).| Cybersecurity and Infrastructure Security Agency CISA
Qualys reviews the 2024 midyear threat landscape, focusing on weaponized vulnerabilities, CVE trends, and key strategies to strengthen cybersecurity defenses.| Qualys
CISA has added CVE-2024-54085 to its known exploited vulnerabilities list as enterprises struggle with incomplete vendor patches.| Network World
This is the first of two blogs with my thoughts on Known Exploited Vulnerabilities (KEV) tracking and the challenges that come with tracking them. Introduction On November 03, 2021, Cybersecurity a…| Rants of a deranged squirrel.
Cybersecurity is becoming increasingly important, but also increasingly complicated. Learn how to achieve and maintain compliance with laws & regulations.| Anchore
Emergency Directives| Cybersecurity and Infrastructure Security Agency CISA