MITRE
CISA-Sponsored CVE Program Grants Nozomi Networks CNA Status
Moreno Carullo | | All, Blog, CAN, cisa, CVE Numbering Authority, CVE Program, DHS, Labs Blogs, MITRE, OT & IoT Vulnerabilities
Nozomi Networks is a CVE Numbering Authority (CNA). The CVE Program is the international standard for identifying and naming cybersecurity vulnerabilities. The post CISA-Sponsored CVE Program Grants Nozomi Networks CNA Status appeared ...
CISA-Sponsored CVE Program Grants Nozomi Networks CNA Status
Moreno Carullo | | All, Blog, CAN, cisa, CVE Numbering Authority, CVE Program, DHS, Labs Blogs, MITRE, OT & IoT Vulnerabilities
Nozomi Networks is a CVE Numbering Authority (CNA). The CVE Program is the international standard for identifying and naming cybersecurity vulnerabilities. The post CISA-Sponsored CVE Program Grants Nozomi Networks CNA Status appeared ...
MITRE Releases an Update to The Common Weakness Enumeration (CWE)
MITRE has been doing exceptional work in advancing cybersecurity as a public good, and it is an excellent resource for security professionals. Possibly best known for their ATT&CK Framework, a rich source ...
Podcast Episode 3: How the MITRE ATT&CK Framework Can Improve Your Defenses
Listen and subscribe to our new podcast! Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim ...
The MITRE ATT&CK Framework: Impact
Not all attackers are trying to exfiltrate data. In security, we’re all familiar with CIA triad—confidentiality, availability, and integrity. While Exfiltration describes adversarial behavior with the goal of violating confidentiality, attackers may ...
Only Focused on Patching? You’re Not Doing Vulnerability Management
By Anthony Perridge, VP International, ThreatQuotientWhen I speak to security professionals about vulnerability management, I find that there is still a lot of confusion in the market. Most people immediately think I’m ...
Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google
Tom Eston | | CVSS, CWE, Cybersecurity, DuckDuckGo, google, Hackers, MITRE, NIST, Podcast, Podcast Episodes, Privacy, Smart City, software, Vulnerabilities
In episode 94 of our monthly show for November 2019: The 25 most dangerous vulnerabilities, the privacy of new “smart cities”, and which search engine keeps your searches more private? It’s DuckDuckGo ...
SQL Injection loses #1 spot as most dangerous attack technique
Filip Truta | | CVE, CWE, DHS, Industry News, MITRE, OWSAP, Slider, SQL, sql injection, SQL injection attack
The Common Weakness Enumeration (CWE), a community-developed compilation of the most critical errors leading to vulnerabilities in software, has lowered SQL Injection from its #1 spot as the most dangerous attack technique ...
ATT&CK Structure Part II: From Taxonomy to Ontology
In Part I, I described some structural problems in MITRE’s ATT&CK adversarial behavior framework. We looked at a couple of examples of techniques that vary greatly in terms of abstraction as well ...

