Vulnerability Management Blog

Delve
March 17, 2020

Introduction In what seems like no time, artificial intelligence is directly influencing, or fully responsible for a number of products and services we are rapidly taking for granted, everything from self-driving vehicles, to medical imaging, to speech recognition, to the optimization of your playlist. AI technology, however, has been largely…

Delve
March 17, 2020

Delve’s modern vulnerability management solution minimizes the manual effort - and eliminates the guesswork - from conventional VM operations. Unlike legacy VM products that have delivered precious little innovation in the past decade, Delve offers: A Fully Integrated, Comprehensive Solution An Automated, Configuration-Free Approach to VM Self-Learning, ML-driven Performance Improvement…

Delve
March 13, 2020

Vulnerabilities in complex software are inevitable, as inevitable as human fallibility. So, building a cybersecurity program without a robust vulnerability management process would be akin to building a house without gutters and hoping it won’t rain.

Delve Labs Team
March 5, 2020

  This blog is part 2/2 of the Vulnerability Management Glossary. In the cybersecurity and vulnerability management industry, there are vast amounts of unique terms that are commonly used within the sector, here we will highlight the essential and everyday terms for a better understanding of vulnerability management.  

Jeff Hill
March 4, 2020

Vendors need to focus on building security solutions that 1) reduce manual labor, and 2) can be used by inexperienced and non-expert cyber security staff. Doing so is the only way precious expert resources can focus on high-value,more strategic security tasks.

Delve Labs Team
March 4, 2020

  In the world of cybersecurity and vulnerability management, there are vast amounts of unique terms that are commonly used within the industry. This blog is part 1/2, and highlights the essential and everyday terms for a better understanding of vulnerability management.