Vishal GargA Deep-dive on Exploit Prediction Scoring System (EPSS) — Part 1In today’s rapidly evolving cyber landscape, vulnerability management — a practice of identifying, prioritising, and remediating known…May 16May 16
Vishal GargExploring CISA KEV: A Tool for Effective Vulnerability ManagementUnderstand how to take advantage of CISA KEV to strategically enhance your vulnerability management program.Apr 141Apr 141
Vishal GargIs NVD Dead? RIP NVD!The Inception and Evolution of NVD, Current Challenges, Future of NVD, and the Way Forward for the Cybersecurity Industry!Mar 30Mar 30
Vishal GargA Brief Overview of Common Vulnerabilities and Exposures (CVE)Learn about the importance of CVEs in Vulnerability Management, CVE Program organization, and the CVE generation process.Mar 221Mar 221
Vishal GargTop Cybersecurity NewslettersA compilation of top-tier cybersecurity newsletters providing regular updates on critical cybersecurity topics.Nov 25, 20232Nov 25, 20232
Vishal GargIs Software Supply Chain Security More Than Just Open-Source and SBOMs?If software supply chain security is not about open-source and SBOMs, what else is there to consider? In fact, a lot more!Nov 13, 2023Nov 13, 2023
Vishal GargSoftware Supply Chain Attacks — A CAPEC PerspectiveA comprehensive view of how the MITRE CAPEC framework organizes supply chain attack patterns within a robust and flexible three-tier…Oct 11, 2023Oct 11, 2023
Vishal GargMITRE ATT&CK Framework and Supply Chain CompromisesAn in-depth review of MITRE ATT&CK framework for ‘supply chain compromises’.Aug 23, 2023Aug 23, 2023
Vishal GargWhy Should We Care About Software Supply Chain Security, and Why Now?As software continues to shape our world, securing its supply chain becomes imperative to ensure a safer and more reliable digital future.Aug 19, 2023Aug 19, 2023
Vishal GargHistory and Evolution of Software Supply Chain AttacksAn exploration of software supply chain threats evolving from initial experiments to sophisticated nation state and APT attacks.Aug 8, 2023Aug 8, 2023