Articles


Article
Don’t panic over CISA’s KEV list, use it smarter
Tod Beardsley, VP of Security Research at runZero, explains what CISA’s Known Exploited Vulnerabilities (KEV) Catalog is and how security teams...
Article
Trend analysis: intelligent vulnerability triage
The relentless deluge of digital threats has transformed the cybersecurity landscape into a constant battle of prioritization.
Article
New paper and tool help security teams move beyond blind reliance on CISA’s KEV catalog
The KEV list is useful but largely misunderstood. KEVology explains what it is, and how best to use it.
Article
Researchers publish tool to enhance CISA KEV prioritization
A new paper offers an in-depth look at the CISA Known Exploited Vulnerability (KEV) catalog, providing a free tool to help security teams better...
Article
What CISA KEV is and isn’t – and a tool to help guide security teams
A new paper gives an insider’s perspective into CISA’s Known Exploited Vulnerability catalog – and also offers a free tool to help security teams...
Article
Data tool to triage exploited vulnerabilities can make KEV more useful
A disconnect exists between the organization's cybersecurity needs and lists like CISA's KEV Catalog. KEV Collider combines data from multiple...
Article
Generational readiness, or lack thereof, in cybersecurity
Despite their tech-savviness, younger generations' preference for convenience creates security gaps that necessitate the more disciplined, cautious...
Article
When Security Infrastructure Is Breached: How to Respond to the Cisco Email Gateway Flaw
Rob King Director of Applied Research, was interviewed about Cisco’s SEG appliances in TechNadu’s "Expert Insights" series.
Article
Legacy vulnerability management tools can’t keep up. Here’s the path forward
Key takeaways from a webcast with HD Moore, Tod Beardsley about emerging practices and technologies reshaping vulnerability management.
Article
Undead operating systems haunt enterprise security networks
Windows 10 reaches end-of-life on Oct. 14, which will triple the number of vulnerable enterprise systems and create a massive attack surface for...
Article
“We find what others miss” – HD Moore on building runZero and scaling in Texas
From teenage hacker to the architect behind one of the most widely used penetration testing platforms on the planet, HD Moore’s fingerprints are...
Article
How has IoT security changed over the past 5 years?
Tod Beardsley talks about the subtle improvements from new laws and best practices, and how much work remains.