Quantcast
Last updated on April 16, 2014 at 21:24 EDT

Latest CVSS Stories

2012-08-06 06:26:53

DALLAS, Aug. 6, 2012 /PRNewswire/ --Critical Watch, the innovator of Active Countermeasure Intelligence, today announced the launch of its ACI Recommendation Engine(TM). As the power behind the ACI Platform(TM), it provides the most effective method available to consolidate multiple disparate data points into a unified view of risks and recommend applicable countermeasures. The ACI Recommendation Engine(TM) is designed to help close the gap between detection and protection by linking risk...

2010-04-02 07:30:00

BEAVERTON, Ore., April 2 /PRNewswire/ -- netVigilance, the only vulnerability assessment and PCI Approved Scanning Vendor (ASV) vendor that goes Beyond Compliance to detect up to 97% of all common vulnerabilities, today issued an urgent bulletin warning all merchants and retailers subject to PCI-DSS Compliance that new PCI regulations significantly increase their chances of PCI failure during mandatory quarterly external vulnerability scans, unless merchants take corrective actions. Full...

2009-12-16 07:00:00

WALTHAM, Mass., Dec. 16 /PRNewswire/ -- Bit9, Inc., the pioneer and leader in Enterprise Application Whitelisting, today unveiled its annual report on the top popular consumer applications with known vulnerabilities. (Logo: http://www.newscom.com/cgi-bin/prnh/20080204/BIT9LOGO ) The list, published in the research brief entitled, "Report: Top Vulnerable Applications for IT - 2009", is created for IT professionals, who are responsible for providing secure and well-managed computers...

2008-12-11 09:15:00

Reputable programs found vulnerable; Security gaps often left unaddressed WALTHAM, Mass., Dec. 11 /PRNewswire/ -- Bit9, Inc., the pioneer and leader in Enterprise Application Whitelisting, unveiled its annual ranking of popular consumer applications with known security vulnerabilities. Often running outside of the IT department's knowledge or control, these applications can be difficult to detect; they create data leakage risk in endpoints that are otherwise secure; and cause compliance...