CISA Vulnerability Timeline
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
Jon Bellard is the Head of Product at Rootshell Security, where he leads the development of innovative cybersecurity solutions. With a strong background in security consulting and technical sales, Jon drives product strategy and client engagement to meet evolving security needs.
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
Our latest update enhances the asset permission capabilities within the platform, introducing Asset Level Permissions and Asset Group Permissions.
Introducing the ‘One Issue View,’ a transformative feature now available on the Main Dashboard and Issues page.
April 2025 Application Features One Issue View with Enhanced Permission Capabilities Overview Introducing the ‘One Issue View,’ a transformative feature
March 2025 Application Features Attack Surface Management (ASM) Visualization Overview Introducing the Attack Surface Management (ASM) Visualization, an innovative feature
November 2024 Application Features New Features Asset Unmerging/Reassignment Summary: We are pleased to introduce a new feature that allows users to
In today’s dynamic business landscape, safeguarding critical assets is paramount. Every organization operates within a digital realm, and within this
A vulnerability scanning service is essential to any organization’s cyber security strategy. It enables IT security teams to identify security weaknesses within
The Benefits of a Vulnerability Remediation Solution Vulnerability remediation is essential in a world of ever-evolving cyber threats. Successful vulnerability remediation
Vulnerability management is a vast and continuous process that needs to be closely tracked to ensure remediation is timely and
Effective vulnerability management is paramount as cyber threats continue to rise. Vulnerability Remediation Management Tools can help IT security teams gain more
In 2023, staying ahead of evolving threats is paramount as attacks from cybercriminals become daily occurrences. According to a survey done
Protecting your organization from cyber attacks is essential – but it’s becoming a more complex and demanding task. Information security
In 2025, the digital landscape is rife with emerging cyber threats. From attackers using generative AI to perform elaborate phishing
Without vulnerability management reporting, vulnerability data becomes noise. Vulnerability management reports help teams gain clarity on the status of their vulnerability management
In this article: A vulnerability management program lays out the processes required for an IT security team to remediate security vulnerabilities within
The vulnerability management process consists of the actions required for an IT security team to remediate security vulnerabilities within their organization’s network.
Vulnerability management is essential to every modern cyber security strategy. However, it’s impossible to fix every issue discovered by vulnerability
In a cyber landscape teeming with threats, it’s impractical for teams to address every single vulnerability. The solution lies in
Security assessments can inundate teams with data. Translating your data into insightful vulnerability management metrics can make it more useful and actionable.
Most security-conscious businesses would say they carry out vulnerability management, but what that means can differ dramatically from one organization
A vulnerability management dashboard is a useful way of organizing vulnerability data to make it as insightful and actionable as possible. In
In this article: The Vulnerability Management Cycle is a useful framework for guiding IT security teams’ remediation processes, from discovery to validation.
As organizations extend their digital capabilities and adopt more complex tech infrastructures, cybersecurity risks become more difficult to manage. An
Cyber criminals are constantly looking for ways to exploit any weaknesses in a business’ digital infrastructure, which is why it
Vulnerability management as a service provides teams with the expertise of a dedicated, managed scanning service. Some vendors will also
In today’s ever-evolving cyber landscape, Vulnerability Intelligence has emerged as an indispensable pillar of any robust vulnerability and threat management strategy. By offering
Vulnerability and penetration testing services are two types of cyber security assessments. They differ in breadth, depth, scope, and serve different
Threat and vulnerability management involves identifying, analysing, prioritizing, and remediating weaknesses in an organization’s network. Ensuring that threat and vulnerability management
It’s impossible to address every cyber security risk within an organization’s threat landscape – there could be hundreds. That’s why Risk Based
As the number of threats to organizations continues to increase, so does cyber risk. That’s why Cyber Security Risk Management
For many organizations, cloud environments are a central and critical part of their digital estates. It’s essential that cloud environments
Vulnerability management is a critical part of any cybersecurity strategy. However, for larger organizations, the complexity of your systems and
The Difference Between Attack Surface Management (ASM) and Vulnerability Management (VM) Cybersecurity is a dynamic field that constantly evolves with
September 2023 Application Features Email Notification for 2FA Reset – Users will now receive email notifications when their 2FA is reset
September 2024 Application Features New Feature Asset Query Optimization – This update is part of our ongoing efforts to improve the
As part of our July Platform Release, over the next few weeks, we will be going into more detail about
As part of our July Platform Release, we will be going into more detail about each of the key improvements.
November 2024 Application Features New Features Data Archiving for Enhanced Performance Summary: In response to the growing datasets of our long-term
Asset Level ACLs We continually strive to enhance the functionality and security of our vulnerability management platform. We are pleased
Elevate Your Web Application Security with Qualys WAS Reports Integration We’re excited to expand our integration capabilities by adding support
Enhance Your Cybersecurity Operations At Rootshell, innovation drives our mission to provide the most effective and user-friendly cybersecurity solutions. Today,
MITRE ATT&CK® Framework At Rootshell Security, we are continuously seeking ways to advance our cybersecurity tools and methodologies. We are
May Release As part of our ongoing commitment to enhancing platform functionality and ensuring superior security management, we are excited
February 2024 Application Features New Features Public API v1 for Enhanced Enterprise Integration Summary: We are excited to announce the launch
We are thrilled to unveil our latest operational and channel partner features, designed to amplify our partners’ brand presence, streamline
The recent updates to the Rootshell Platform have set new standards in operational efficiency and security management. Among these updates, we’re unveiling
In a world where cybersecurity threats are ever-evolving, staying ahead with innovative solutions is not just an option but a necessity.
February 2024 Application Features New Features Black Kite Intelligence Integration – We are excited to announce the integration of Black Kite
Improved Nessus CVSS Scoring In our ongoing efforts to provide seamless integration and data accuracy, we’ve introduced an important enhancement
Vulnerability Correlation Database A Revolution in Remediation Management We’re taking cybersecurity to the next level with the introduction of a
Customisable SLA Email Content We understand that every organization has unique needs and communication styles, especially when it comes to
November 2023 Application Features New Features SLAs – Customisable Content – We understand that every organization has unique needs and communication
June 2023 Application Features Automatic Dynamic Remediation – Rootshell now supports a fully automated end-to-end vulnerability management solution with the ability
June 2023 Release Rootshell Platform’s June release completes our journey to full automation of vulnerability management; adding the ability to
Automate Based on Business Context CVSS scores only tell part of the story of an issue’s severity. Without contextualizing vulnerabilities
April 2023 Application Features New Features Automation Centre – Rootshell now supports the creation of automated processes to greatly assist users
Never Miss a Priority Issue Again Rootshell Platform’s Automation Center enables teams to create a range of automation rules that
February 2023 New Features New Level 2 Integration | SentinelOne – Rootshell now supports the uploading and parsing of a csv
Part of our three part series In our three part series on what makes an effective vulnerability management program, we
No one-size-fits-all solutions here! As is the case for any high performing team, the talent and experience of your personnel
Vulnerability Management Program In its simplest form, a vulnerability management program will consist of running scans, distributing results, and remediating
Say goodbye to PDFs It’s likely that data guides nearly every decision of your vulnerability remediation process, yet managing it is
Six ways you can improve your vulnerability remediation process, including how the Rootshell Platform can help. Managing the remediation of