Vulnerability Management Blog

Jeff Hill
January 26, 2020

In a 2018 interview, former US Navy SEAL Robert O’Neil was asked about the infamous SEAL training technique in which their hands are tied behind their backs, and their feet tied together.  They then jump...

Delve Labs Team
January 2, 2020

Vulnerability Assessment Example The challenge providing or discussing a vulnerability assessment example is that, by its very nature, the phrase “vulnerability assessment example” implies it’s a point-in-time activity. The very phrase sends the wrong message...

Serge-Olivier Paquette
December 11, 2019

Part 1 - Problem finders are the best data scientists This is the first article in a series of blog posts that highlights some lessons learned in the field by doing “real and dirty” data...

Jeff Hill
December 2, 2019

If you’re in the mood for some non-controversial, light entertainment you don’t have to work too hard to enjoy, rent the movie Yesterday.  The premise is clever:  a global weather event removes any and all...

Jeff Hill
November 11, 2019

I got a chance to watch Dave Chappelle’s latest comedy special this weekend, and among the hour-long show’s bits was one that ridiculed Nancy Reagan’s 1980’s advice for drug addiction:  “Just Say No.” The First...

Jeff Hill
October 14, 2019

Contextual Prioritization in Vulnerability Management The risk threat vulnerability of a typical exposure to date has largely been the same no matter where the risk threat vulnerability lies.  The risk or threat of a given...