Blog Spotlight

todayDecember 17, 2021

Cyber security + Software Supply Chain Cybersecurity Shawn McManus

Log4shell – the newest vulnerability

Introduction On Thursday, December 9th, the vulnerability CVE-2021-44228 known as “Log4shell” was made public, sending large companies such as Twitter, Amazon, Google, Cloudflare, and many others in a rush to patch it before any damage could be done. Not only are large companies affected, but many applications and servers utilizing [...]

Top Voted Blog Posts
Sorry, there is nothing for the moment.

Vulnerability Management

share close
Vulnerability Management Overview

We provide automated scanning services for web applications, databases, systems, network appliances, and other types of nodes. We can also help your organization develop an end-to-end vulnerability management program to help ensure long term security compliance, especially if you are enrolled and are trying to maintain government regulations or organizational certifications like SOC 1 and 2. This includes an asset identification program, a vulnerability scanning program, a patch management program, and even a bug bounty program. We can even write the policies and procedures for the program and present them to upper management.

Contact Us
Key Benefits

check Meet SOC Scanning Compliance Requirements

check Determine Vulnerabilities in External Facing Applications and Websites

check Define Custom Scans

check Develop Holistic Vulnerability Management Programs