Despite the NVD (National Vulnerability Database) outage of the NIST (National Institute of Standards and Technology), Greenbone’s detection engine remains fully operational, offering reliable, vulnerability scanning without relying on missing CVE enrichment data. Since 1999 The MITRE Corporation’s Common Vulnerabilities and Exposures (CVE) has provided free public vulnerability intelligence by publishing and managing information about […]
When it comes to protecting your organization from digital threats, who should you trust? Reality dictates that high-resilience IT security is forged from a network of strong partnerships, defense in depth; layered security controls, and regular auditing. Defensive posture needs to be monitored, measured and continuously improved. While vulnerability management has always been a core […]
https://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.png00Joseph Leehttps://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.pngJoseph Lee2025-04-09 13:46:272025-04-09 13:49:33March 2025 Threat Report: Who Do You Trust?
Vulnerabilities in IT environments appear in different forms. The most common ones are likely software vulnerabilities that have not been patched. Then there are weak passwords, misconfigurations or network switches that have been EOL for five years. However, another type of security gap sometimes causes significant confusion during the scans: hardware vulnerabilities. We have become […]
https://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.png00Dirk Boeinghttps://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.pngDirk Boeing2025-04-02 12:00:332025-04-02 12:00:33The CPU as a Weakness: how to Manage Hardware Risks with Confidence
Greenbone Detection Stays Strong Despite NIST NVD Outage
BlogDespite the NVD (National Vulnerability Database) outage of the NIST (National Institute of Standards and Technology), Greenbone’s detection engine remains fully operational, offering reliable, vulnerability scanning without relying on missing CVE enrichment data. Since 1999 The MITRE Corporation’s Common Vulnerabilities and Exposures (CVE) has provided free public vulnerability intelligence by publishing and managing information about […]
March 2025 Threat Report: Who Do You Trust?
BlogWhen it comes to protecting your organization from digital threats, who should you trust? Reality dictates that high-resilience IT security is forged from a network of strong partnerships, defense in depth; layered security controls, and regular auditing. Defensive posture needs to be monitored, measured and continuously improved. While vulnerability management has always been a core […]
The CPU as a Weakness: how to Manage Hardware Risks with Confidence
BlogVulnerabilities in IT environments appear in different forms. The most common ones are likely software vulnerabilities that have not been patched. Then there are weak passwords, misconfigurations or network switches that have been EOL for five years. However, another type of security gap sometimes causes significant confusion during the scans: hardware vulnerabilities. We have become […]