Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2023

Rezilion Research Discovers Hidden Vulnerabilities in Hundreds of Docker Container Images

Rezilion announces release of the company's new research, "Hiding in Plain Sight: Hidden Vulnerabilities in Popular Open Source Containers," uncovering the presence of hundreds of docker container images containing vulnerabilities that are not detected by most standard vulnerability scanners and SCA tools.

Automation Helps Address Vulnerability Management Amid a Cybersecurity Skills Gap

Automation is an important element amid an ongoing cybersecurity skills gap. Anyone who works in the cybersecurity field knows that there has been a skills shortage going on for years. And unfortunately, there are no signs that the gap between demand and supply will close anytime soon. This is a frightening scenario for security leaders and their organizations, because the attacks and attackers keep getting more sophisticated and the threat landscape more complex.

Fast Facts: How to Find and Fix the Log4j Vulnerability in Under 2 Minutes

Many organizations still need to find the Log4j vulnerability in their environment and address the risk. The news about Log4Shell, the vulnerability impacting the Apache Log4j software library, first burst onto the scene and became a headache for admins everywhere in December 2021. But the fall-out is far from over.

What Is an SBOM and Why Is It Important?

The way companies build software solutions has dramatically changed in the past few years. Now more companies use microservices architecture, as it provides more efficiency, resiliency, and agility, to develop and release apps quickly and more frequently. This approach has enabled developers to utilize more third-party containers and resources to develop efficiently working applications. It also means that less code of a software tool is managed and owned by an organization directly.

SCA and SBOM: What's the Difference?

What’s the difference between an SBOM verse SCA tools? Allow us to explain. Software bill of materials (SBOMs) have been garnering a lot of attention as of late, especially since the 2021 Biden Administration executive order mandating that organizations doing business with the government provide a detailed inventory of all components that make up an application to improve cybersecurity.

Want a True Assessment Of Your Software Risk? Start With Our Guide

As valuable as software is for business, it’s also a source of continuous risk for organizations. A software risk assessment is essential to address these issues, which can leave an organization vulnerable to cybersecurity attacks, license compliance issues and other problems.

Rezilion vs SCA: How The Two Compare

Software composition analysis tools (SCA) are not created equal. A big pain point is that because they’re limited in what they see, developers get caught in a sea of false positives, which slows down their response time. That’s not the case with Rezilion’s SCA. Our tool remediates any significant issues it uncovers throughout the SDLC. Here’s what you can expect: Full visibility.