unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Avoid missing crucial vulnerability intelligence amid NVD backlog
Recent developments regarding the National Vulnera...
2024-4-9 17:4:10 | 阅读: 1 |
收藏
|
Software Vulnerability Management – Flexera Blog - www.flexera.com
nvd
software
analysis
flexera
Understanding the complexities of vulnerability management
Software vulnerabilities, often seen as mere techn...
2024-1-16 01:50:58 | 阅读: 8 |
收藏
|
Software Vulnerability Management – Flexera Blog - www.flexera.com
svr
svm
security
threats
Application specialist and vulnerability management leaders forge partnership for secure patching process
There’s no getting around it: Today’s digital worl...
2023-3-30 20:0:24 | 阅读: 5 |
收藏
|
Software Vulnerability Management – Flexera Blog - www.flexera.com
software
camwood
flexera
partnership
Prioritize vulnerability assessment more easily with these simple steps— and intelligence—from Secunia Research
The cost of an exploited vulnerability due to a cy...
2022-10-4 22:29:16 | 阅读: 30 |
收藏
|
www.flexera.com
secunia
flexera
security
software
Keep your finger on the pulse of the most critical software vulnerabilities in the market
Hackers can deploy exploits in a week or less. Tha...
2022-7-21 22:0:22 | 阅读: 17 |
收藏
|
www.flexera.com
software
secunia
flexera
security
Overwhelmed by vulnerabilities? Here’s the best way to prioritize them.
We know that software vulnerabilities remain one o...
2022-4-26 16:0:52 | 阅读: 12 |
收藏
|
www.flexera.com
software
exploited
prioritize
asset
Apache Log4j 2, Flexera and you
By now, you’ve probably learned of Apache Log4j 2....
2021-12-17 18:00:40 | 阅读: 25 |
收藏
|
www.flexera.com
log4j
secunia
flexera
asset
VMware and Flexera team-up to address critical need
Keeping...
2021-05-21 00:33:30 | 阅读: 97 |
收藏
|
www.flexera.com
software
flexera
security
criticality
How ITAM can close the door on asset vulnerabilities
Software either is or will be vulnerable. It’s rare that you won’t have to update out-of-date, u...
2020-12-15 00:40:14 | 阅读: 127 |
收藏
|
www.flexera.com
security
software
itam
secunia
Cyber risks of working from home – Maintaining control over your IT environments
Working from home (WFH) has taken over as the new normal for employees at many organizations. Wh...
2020-04-30 23:00:05 | 阅读: 73 |
收藏
|
www.flexera.com
software
workforce
hardware
remote
Discover Intelligent Patch Automation for Your Software Vulnerability Management
Your organization is unique. So is your IT team and their approach to managing the IT estate. Bu...
2020-04-04 02:51:00 | 阅读: 57 |
收藏
|
www.flexera.com
software
percent
ten
security
One Patch Tuesday to Rule Them All
On the second Tuesday of each month, many IT leaders rejoice—or maybe cringe, depending on their...
2020-02-07 00:00:25 | 阅读: 60 |
收藏
|
www.flexera.com
microsoft
tuesday
secunia
prioritize
Save Time and Money by Enabling IT Staff to Update Software Better and Faster
You need new and updated software deployed throughout your organization constantly. Security upd...
2019-12-06 23:00:12 | 阅读: 66 |
收藏
|
www.flexera.com
software
adminstudio
flexera
migration
researching
The process of deciding the relative importance of a thing
What does your to do list look like? If it’s anything like mine, it includes things like grocery...
2019-06-05 22:51:25 | 阅读: 57 |
收藏
|
www.flexera.com
dog
food
buying
sweeping
What Sugar Ray Leonard Can Teach Us About Cybersecurity
We can’t take this analogy too far, but do you remember the historic 1980 “no mas” fight between...
2019-06-03 23:25:44 | 阅读: 56 |
收藏
|
www.flexera.com
security
software
mentions
leonard
CVE-2019-0708: Winter Doesn’t Have to Come Today
For those of you not in love with Game of Thrones Season 8 (see the petition asking HBO to redo...
2019-05-21 20:20:24 | 阅读: 51 |
收藏
|
www.flexera.com
windows
microsoft
software
hardware
Recent RDS Vulnerability, and What EOL Software Means for You
Once again, a vulnerability has been discovered in older Microsoft Windows operating systems tha...
2019-05-21 02:57:18 | 阅读: 57 |
收藏
|
www.flexera.com
software
susceptible
windows
maintaining
asset
Introducing: Threat Intelligence Module
A new module is now available for our software vulnerability management solutions. It is called...
2019-03-30 00:33:04 | 阅读: 61 |
收藏
|
www.flexera.com
software
security
exploited
scores
Prevent Brand-Damaging Breaches With Better ITAM Practices
In a rapidly changing IT landscape where digital business initiatives are being adopted, it is a...
2018-12-20 04:38:28 | 阅读: 63 |
收藏
|
www.flexera.com
security
asset
itam
cloud
boarding
SCUP Catalogs vs. Software Vulnerability Manager
Systems...
2018-10-04 07:01:58 | 阅读: 25 |
收藏
|
www.flexera.com
catalog
scup
software
limitations
insight
Previous
1
2
3
4
5
6
7
8
Next