Software Attack Surface Management
Beyond SolarWinds: 6 More Notable Software Supply Chain Attacks
SolarWinds has become almost a household name and for all the wrong reasons: beginning in 2019, the system management company was the target of one of the largest software supply chain attacks ...
Want a True Assessment Of Your Software Risk? Start With Our Guide
As valuable as software is for business, it’s also a source of continuous risk for organizations. A software risk assessment is essential to address these issues, which can leave an organization vulnerable ...
Where is Your Risk? Software Supply Chain Security Weaknesses
In the first two posts of this series on software-related risks we have looked at vulnerabilities introduced in the development phase and vulnerabilities present in open source software. The third major risk ...
Rezilion Research: 2022 Vulnerabilities Recap
Rezilion’s research team offers a 2022 vulnerabilities recap and takes a look at the headline-making vulnerabilities discovered in the last year. Read the recap in this report and find out about the ...
Enhancing CISO Communication with Boards and C-Suites in 2023
CISO communication skills have never been more essential. Organizations are facing unprecedented cybersecurity risks, not the least of which are software vulnerabilities that can turn into nightmarish supply chain attacks. Headline-grabbing events ...

Log4Shell Anniversary: One Year Later, What Has Changed?
The Log4Shell anniversary is here. It has been a year since the initial discovery and publication of Log4Shell (CVE-2021-44228), which was without a doubt one of the most meaningful vulnerabilities in recent ...
Securing a Windows Development Environment
For many development organizations, Microsoft Windows remains the dominant operating platform. Therefore, ensuring the security of these systems needs to be a high priority for security leaders and teams and a Windows ...
Forbes: Vulnerability Backlogs Are A Dangerous Time Suck
Vulnerability backlogs imperil our organizations when it comes to security. With budget tights and resources limited, time is money. And in security, we are in a race against time to both avoid ...
What You Need to Know About SBOM Generation Tools
When it comes to tools for generating a software bill of materials (SBOM), organizations basically have three options: use a software composition analysis (SCA) product, deploy an open source command-line interface (CLI) ...

Clearing the Fog Over the New OpenSSL Vulnerabilities
By Yotam Perkal and Ofri Ouzan, Rezilion Security Research There has been a lot of tension building up since the announcement made by the OpenSSL project team last week (October 25th) regarding ...