Vulnerability Management Blog

Jeff Hill
October 1, 2019

Vulnerability Management and WWII Aircraft Professor Anderson, a legend in the Aerospace Engineering Department at the University of Maryland, was one of the best professors I ever had.  He just loved Aerospace Engineering, and especially...

Eric Boivin
September 14, 2019

In cybersecurity, not all vulnerabilities are created equal. This is why prioritization is essential to know which ones really matter for your organization. In this blog post, I’ll present a new feature that we’ve added...

Jeff Hill
September 13, 2019

At one of my first jobs in the late 90s, one of my co-workers, a former mechanic and clearly good with cars, purchased an old manual for his used Datsun – pretty sure it was...

Serge-Olivier Paquette
September 12, 2019

This is part 3 in our series on contextual predictive prioritization. In part 1 we presented the overwhelming problem of vulnerability prioritization and in part 2 we presented our solution, contextual analysis, using hands-on examples of real vulnerabilities. This...

Norman Menz
September 11, 2019

I’ve never much cared for the phrase “data-driven decision.”  It’s not that I endorse gut-level decision-making or shooting from the hip, but rather I take exception to the word “data” in this context.  In short,...

Gabriel Tremblay
September 10, 2019

We always come from somewhere Almost no idea arises from a complete void. The idea of a genius thinker that possesses ideas that no one has is to startup world what unicorns are to biology:...