vulnerability scanners
Report: Hundreds of Vulnerabilities Lurk Undetected in Containers
We’re excited to release an important piece of research today about dangerous vulnerabilities hiding in container images that are commonly used and found in organizations around the world. The report, titled “Hiding ...
Rezilion Outperforms Leading Vulnerability Scanners in Benchmark Analysis
According to recent research, Rezilion’s vulnerability scanner was 12% more accurate at identifying existing vulnerabilities vs. industry standard (94% vs. 82% average precision). Vulnerability scanners and software composition analysis (SCA) tools are ...
Is Your Vulnerability Scanner Giving You Reliable Results?
In a software-driven world, the number of newly discovered software vulnerabilities is constantly on the rise globally. Organizations rely on vulnerability scanners and Software Composition Analysis (SCA) tools to detect vulnerabilities in ...
Proactive System Hardening: Continuous Hardening’s Coming of Age
The first article in this series examined configuration hardening—essentially looking at ports, processes and services where security configuration management (SCM) is key. The second article looked at application and version hardening strategies ...
Proactively Hardening Systems: Application and Version Hardening
The first article in this series examined configuration hardening, essentially looking at ports, processes and services as the “doors, gates and windows” into a network where security configuration management (SCM) becomes the ...
Configuration Hardening: Proactively Guarding Systems Against Intrusion
The concept of configuration hardening has nice imagery to it. When we use it to describe battle-hardened soldiers who have been tested in combat, a grim, determined image invariably leaps to mind ...