Blog Posts

Should I use Continuous Vulnerability Assessment?

When it comes to protecting your organization from cyber threats, one of the most important decisions you will make is whether or not to use continuous vulnerability assessment. A vulnerability assessment is a process of identifying, quantifying, and prioritizing (by using a risk management framework) the vulnerabilities in an organization's IT systems, applications and infrastructure.

Read More

How do I select someone to do vulnerability assessments?

When it comes to selecting a vendor to perform vulnerability assessments, there are a few key factors to consider. First and foremost, it's important to understand the difference between a vulnerability assessment and a penetration test. A vulnerability assessment is a non-intrusive evaluation of your organization's systems, networks, and applications to identify and assess any vulnerabilities that could be exploited by an attacker. A penetration test, on the other hand, is a simulated attack on your systems, networks, and applications to test the effectiveness of your security controls.

Read More

What is a bug bounty program? And why consider implementing one?

A bug bounty program is a system in which a company or organization offers rewards to individuals who discover and report vulnerabilities in their software or systems. These programs have become increasingly popular in recent years as a way for companies to improve their cybersecurity posture and protect against cyber threats.

Read More
vulnerability, threat, cybersecurity Christian Grupp vulnerability, threat, cybersecurity Christian Grupp

What is the difference between a vulnerability and a threat?

When it comes to cybersecurity, it's important to understand the difference between a vulnerability and a threat. A vulnerability is a weakness in a system, network, or device that could be exploited by an attacker, while a threat is a potential danger that could take advantage of that vulnerability. In this blog post, we will discuss the difference between a vulnerability and a threat and how they relate to cybersecurity.

Read More