The Surprising Complexity of Finding Known Vulnerabilities

20. March 2024

IT security professionals need an efficient and reliable solution for identifying known vulnerabilities in a software product, given its name and version.

Our colleagues at usd HeroLab place high demands on such a solution. They evaluated several available solutions to arrive at the conclusion that not one of them sufficiently meet their requirements. Core challenges in this area include different names for the same product, complex version numbers and data timeliness. As a consequence, they have started developing their own tool: search_vulns.

Learn more about the challenges of finding known vulnerabilities and the requirements corresponding solutions should meet in our LabNews.

Also interesting:

EU AI Act: The 7 Most Important Questions

EU AI Act: The 7 Most Important Questions

The EU AI Act establishes the world's first comprehensive legal framework for artificial intelligence. What was previously considered a technological playground is now becoming a regulated responsibility. Artificial intelligence (AI) can no longer operate without...

DORA Requirements Become More Concrete: Further RTS and ITS Published

DORA Requirements Become More Concrete: Further RTS and ITS Published

Original publication date: July 30, 2024. Since this blog post was published, the final versions of the RTS and ITS have been released. You can find a concise overview here: Digital Operational Resilience Act (DORA) - EIOPA. The Digital Operational Resilience Act...

Categories

Categories