Blog

Security Insights

Deep dives, expert analysis, and practical guidance on exposure management, adversarial validation, and the future of AI-driven exposure management.

Data Breaches for the Month July 2024
Data Breaches

Data Breaches for the Month July 2024

Every month, we witness a significant rise in data breaches, underscoring the increasing importance of robust cybersecurity measures. At Strobes, we meticulously track these security events to provide comprehensive insights and analyses. In this blog, we focus on the key breaches of July 2024, offer

Jul 31, 20244 min
Top CVEs of July 2024: Key Vulnerabilities and Mitigations
CVEVulnerability Management

Top CVEs of July 2024: Key Vulnerabilities and Mitigations

July 2024 has surfaced a series of significant vulnerabilities that could compromise the security of many organizations. From Bamboo Data Center flaws to critical issues in ServiceNow, these vulnerabilities present serious risks. This blog explores the top five CVEs of the month, providing detailed

Jul 31, 20246 min
How much does a penetration test cost?
Penetration Testing

How much does a penetration test cost?

Curious about how much penetration testing costs? You understand its importance, but budgeting for different pentests can be a challenge. This blog post will guide you through the intricacies of penetration testing pricing, helping you make informed decisions for your organisation. We'll explore var

Jul 17, 202425 min
Vulnerability Management Lifecycle: The Ultimate Guide to Business Security
Vulnerability Management

Vulnerability Management Lifecycle: The Ultimate Guide to Business Security

63% of organizations faced cyberattacks due to unpatched vulnerabilities, yet leading companies stay ahead with a strong Vulnerability Management Lifecycle (VML). This structured process helps identify, prioritize, and remediate risks across IT assets, reducing exposure and strengthening resilience.

Jul 16, 202427 min
CVSS Score: A Comprehensive Guide to Vulnerability Scoring
Vulnerability Management

CVSS Score: A Comprehensive Guide to Vulnerability Scoring

What is a CVSS score? Understanding the Why: The Need for CVSS 4 CVSS Metrics CVSS Base Metrics CVSS Temporal Metrics CVSS Environmental Metrics Is the CVSS score enough for vulnerability management? What to Use Alongside CVSS Scores? Take your Vulnerability Management to the Next Level What is a CV

Jul 4, 202413 min
OpenSSH regreSSHion (CVE-2024-6387): A Blast from the Past with Critical Repercussions
CVE

OpenSSH regreSSHion (CVE-2024-6387): A Blast from the Past with Critical Repercussions

OpenSSH, a crucial tool in secure communications, has recently been impacted by a critical vulnerability identified as CVE-2024-6387, also known as "regreSSHion." This blog will provide an overview of the vulnerability, its exploitation methods, and strategies for mitigation. OpenSSH (Open Secure Sh

Jul 2, 20246 min
PCI DSS v4.0 Changes: Pen Testing & Vulnerability Management Explained
Compliance

PCI DSS v4.0 Changes: Pen Testing & Vulnerability Management Explained

The PCI DSS v4.0 Changes usher in a new era of proactive payment security under the Payment Card Industry Data Security Standard (PCI DSS) v4.0. While PCI DSS v3.2.1 is retired on March 31, 2024, specific v4.0 requirements are enacted after a one-year grace period. This article delves into the criti

Jun 26, 20245 min
Top 15 Vulnerability Management Tools for Businesses in 2025 (Reviewed & Ranked)
Vulnerability Management

Top 15 Vulnerability Management Tools for Businesses in 2025 (Reviewed & Ranked)

You searched for vulnerability management tools but got vulnerability scanners instead, thinking they were the same. While procurement or finance teams might mistakenly equate the two, they serve different functions and offer different levels of security assurance. As cyber threats become more sophi

Jun 20, 202418 min
Top 5 CVEs and Vulnerabilities of May 2024
Vulnerability IntelligenceVulnerability Management

Top 5 CVEs and Vulnerabilities of May 2024

May brought a fresh batch of security headaches. This month, we're focusing on critical vulnerabilities in widely used software like Apache, Gitlab, and Github. These flaws could allow attackers to steal data, hijack systems, or wreak havoc in your network. Let's break down the top 5 CVEs you need t

Jun 3, 20246 min
CTEM (Continuous Threat Exposure Management) - The Ultimate Guide for CISOs
CTEM

CTEM (Continuous Threat Exposure Management) - The Ultimate Guide for CISOs

Cybersecurity defenses have evolved from firewalls to red teaming, yet breaches still make headlines. Why? Because piecemeal security strategies leave blind spots. This is where Continuous Threat Exposure Management (CTEM) changes the game. Instead of reacting after an attack, CTEM delivers ongoing

May 27, 202419 min
Customized Vulnerability Management Dashboard for CISOs
Vulnerability Management

Customized Vulnerability Management Dashboard for CISOs

CISOs need a central hub to visualize critical security data. Strobes vulnerability management dashboard helps create impactful VM CISO dashboards, turning complex data into actionable insights. This guide shows you how to leverage Strobes RBVM’s features to build dashboards that exceed industry sta

May 24, 20246 min
Key CTEM Metrics: Measuring the Effectiveness of Your Continuous Threat Exposure Management Program
CTEM

Key CTEM Metrics: Measuring the Effectiveness of Your Continuous Threat Exposure Management Program

According to a new market research report published by Global Market Estimates, the global continuous threat exposure management (CTEM) market is projected to grow at a CAGR of 10.1% from 2024 to 2029. This significant rise suggests a growing demand for CTEM solutions, which help organizations ident

May 20, 20247 min