Vulnerability Management Blog

Serge-Olivier Paquette
January 6, 2020

Focusing on a vulnerability report example, this blog post introduces the concept of outstanding network asset detection, or what we call Gold Nuggeting, a critical step in vulnerability remediation prioritization. Finding interesting network devices is a fundamental part of the vulnerability prioritization process employed by Delve. While many different factors…

Delve Labs Team
January 2, 2020

Vulnerability Assessment Example The challenge providing or discussing a vulnerability assessment example is that, by its very nature, the phrase “vulnerability assessment example” implies it’s a point-in-time activity. The very phrase sends the wrong message about vulnerability management best practices and the most effective ways to minimize vulnerability risk. In…

Serge-Olivier Paquette
December 11, 2019

Part 1 - Problem finders are the best data scientists This is the first article in a series of blog posts that highlights some lessons learned in the field by doing “real and dirty” data science here at Delve, things nobody teaches you in school and even less in online…

Jeff Hill
December 2, 2019

If you’re in the mood for some non-controversial, light entertainment you don’t have to work too hard to enjoy, rent the movie Yesterday.  The premise is clever:  a global weather event removes any and all recollection of the Beatles and their music from just about every person on the planet,…

Jeff Hill
November 11, 2019

I got a chance to watch Dave Chappelle’s latest comedy special this weekend, and among the hour-long show’s bits was one that ridiculed Nancy Reagan’s 1980’s advice for drug addiction:  “Just Say No.” The First Lady’s bumper-sticker prescription to a massive public health and crime epidemic completely trivialized the complexity…

Jeff Hill
October 14, 2019

Contextual Prioritization in Vulnerability Management The risk threat vulnerability of a typical exposure to date has largely been the same no matter where the risk threat vulnerability lies.  The risk or threat of a given vulnerability can vary greatly from company to company, network to network, and even from location…

Eric Boivin
October 9, 2019

Visualizing your entire vulnerability management inventory, at a glance Having an accurate, current  asset inventory is essential to effective vulnerability management. It may sound obvious, but knowing what assets exist in your organization is the first line of defense in cybersecurity, and not necessarily trivial to accomplish. With Delve and…

Louis-Philippe Huberdeau
October 1, 2019

Inadvertently exposed files are the epitome of a classic aphorism:  never attribute to malice that which is adequately explained by stupidity. What are Exposed Files? The quote, known widely as Hanlon’s Razor, can be applied to myriad circumstances, but at times, it seems like it was written specifically for the…