Report: Hundreds of Vulnerabilities Lurk Undetected in Containers

We’re excited to release an important piece of research today about dangerous vulnerabilities hiding in container images that are commonly used and found in organizations around the world. The report, titled “Hiding ...
This chart shows Average Precision, Recall, and F1-Score per Scanner

Rezilion Outperforms Leading Vulnerability Scanners in Benchmark Analysis

According to recent research, Rezilion’s vulnerability scanner was 12% more accurate at identifying existing vulnerabilities vs. industry standard (94% vs. 82% average precision). Vulnerability scanners and software composition analysis (SCA) tools are ...
Is Your Vulnerability Scanner Giving You Reliable Results?

Is Your Vulnerability Scanner Giving You Reliable Results?

In a software-driven world, the number of newly discovered software vulnerabilities is constantly on the rise globally. Organizations rely on vulnerability scanners and Software Composition Analysis (SCA) tools to detect vulnerabilities in ...

Proactive System Hardening: Continuous Hardening’s Coming of Age

The first article in this series examined configuration hardening—essentially looking at ports, processes and services where security configuration management (SCM) is key. The second article looked at application and version hardening strategies ...

Proactively Hardening Systems: Application and Version Hardening

The first article in this series examined configuration hardening, essentially looking at ports, processes and services as the “doors, gates and windows” into a network where security configuration management (SCM) becomes the ...

Secure Guardrails