Vulnerability Management Blog

François Labrèche
July 2, 2020

  Introduction In cybersecurity, news regarding new vulnerabilities appears continuously every day through an array of various sources, be it news networks, social networks, blogs, security advisories, etc. These fall under the umbrella of open-source intelligence (OSINT). Yet not all vulnerabilities generate the same level of interest and length of…

Eric Boivin
June 22, 2020

It is a pleasure to bring you today's edition of our product features update. The last weeks have kept us very busy working on some important roadmap items. We have welcomed many new clients and users, so whether you are a seasoned Delve veteran or a newcomer, we're confident that…

Pierre-David Oriol
June 1, 2020

Building Trust through Understandability & Interpretability For many years people have been drowning in AI marketing lingo, to a point where it makes it very difficult to understand exactly what AI - or more precisely Machine Learning - can effectively do for them. A lot of AI-based solutions work in…

Louis-Philippe Huberdeau
June 1, 2020

One of the challenges encountered by all software companies that have built AI or machine learning into their products is eliminating “black box” syndrome, or the perception that inputs are consumed by the AI black box, and magically, reliable results are spit out. The results are valid, useful, and can…

Jeff Hill
May 28, 2020

So, what are the most popular and dangerous breach mechanisms? How do the bad guys get on the network in the first place, the first step in any ransomware attack? 

Serge Olivier-Paquette
May 21, 2020

This blog is a transcription of a previous Delve webinar.  Click here to view the original on-demand webinar video. Today's goal is to present some simple ideas of how to use machine learning in cybersecurity. We're going to talk about the basic problems of data overflow in cybersecurity assessments. We’ll…