A Deeper Dive into VEX Documents
5 min read
A Deeper Dive into VEX Documents
By Derek Kruszewski on April 15, 2022

At the end of last summer, I wrote a blog post explaining the merits of Vulnerability Exploitability eXchange (VEX) documents. Almost 8 months later, I stand by the importance of these...

Continue Reading
How Russia Might Come After the West
2 min read
How Russia Might Come After the West
By Eric Byres on February 25, 2022

The DDoS attack surge that began last week against Ukrainian government agencies and banks was a bad sign. I was actually preparing a post and wondering if it was appropriate to call out...

Continue Reading
Log4j: Panic or Lesson? | How to Protect Deployed Assets
4 min read
Log4j: Panic or Lesson? | How to Protect Deployed Assets
By Ron Brash on December 21, 2021

Cleaning up the Mess will Take a Methodical Approach Nearly every week the cybersecurity community buzzes around a newly discovered vulnerability or a breach. December’s alert for the ...

Continue Reading
Sorry Blackberry: You Are Part of the Supply Chain
2 min read
Sorry Blackberry: You Are Part of the Supply Chain
By Eric Byres on November 2, 2021

Today, reporters Betsy Woodruff Swan and Eric Geller at Politico published a story: “BlackBerry resisted announcing major flaw in software powering cars, hospital equipment.” They outline...

Continue Reading
What is VEX and What Does it Have to Do with SBOMs?
3 min read
What is VEX and What Does it Have to Do with SBOMs?
By Derek Kruszewski on August 12, 2021

Recently, we have been fielding many inquiries here at aDolus regarding “VEX.” If you are not familiar with this mysterious abbreviation, you’ve fortunately landed in the right place....

Continue Reading
NTIA Publishes Minimum Components of an SBOM
4 min read
NTIA Publishes Minimum Components of an SBOM
By Derek Kruszewski on July 15, 2021

In today’s blog post I’d like to recognize all the hard work done by NTIA (National Telecommunications and Information Administration) and congratulate them on publishing the minimum...

Continue Reading
Kaseya Supply Chain Attack on SMBs
4 min read
Kaseya Supply Chain Attack on SMBs
By Eric Byres on July 6, 2021

Last week I participated in a panel discussion on the Executive Order’s Impact On Embedded Device Security hosted by ISSSource.com. I signed off with a comment about my biggest worry: ...

Continue Reading
aDolus Welcomes Mark Weatherford to Board
2 min read
aDolus Welcomes Mark Weatherford to Board
By Norma Dowler on June 23, 2021

Cybersecurity veteran tapped to accelerate growth of ICS supply chain security leader VICTORIA, BC, CANADA, June 23 -- aDolus Technology Inc., a global authority on software intelligence...

Continue Reading
Rod Campbell Joins aDolus as CEO
2 min read
Rod Campbell Joins aDolus as CEO
By Norma Dowler on June 15, 2021

Seasoned financial and advisory executive to drive growth VICTORIA, BC, CANADA, June 15, 2021 /EINPresswire.com/ -- aDolus Technology Inc., a global authority on software intelligence for...

Continue Reading
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 4
5 min read
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 4
By Eric Byres on May 26, 2021

Section 3 - Less Fog, More Cloud Section 3: Modernizing Federal Government Cybersecurity of the Executive Order is all about government agencies moving to the cloud and doing it right. If...

Continue Reading
Loading more posts
No more posts to load
1 2 3 4

Stay up to date