<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:atom="http://www.w3.org/2005/Atom"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  >
<channel>
  <title>Flexera Blog - Feed</title>
  <atom:link href="https://www.flexera.com/security/feed/text/" rel="self" type="application/rss+xml" />
  <link>https://www.flexera.com/blog</link>
  <description>Stay in the know</description>
  <lastBuildDate>Fri, 10 Apr 2026 18:44:10 +0000</lastBuildDate>
  <language>en-US</language>
  <sy:updatePeriod>hourly</sy:updatePeriod>
  <sy:updateFrequency>1</sy:updateFrequency>
  <generator>https://wordpress.org/?v=6.9.4</generator>
          <item>
      <title>Decoding likely exploited vulnerabilities (LEV)— A new metric from NIST</title>
      <link>https://www.flexera.com/blog/security/decoding-likely-exploited-vulnerabilities-lev-a-new-metric-from-nist/</link>
      <pubDate>Fri, 18 Jul 2025 14:00:26 +0000</pubDate>
      <dc:creator>Venkat Ram Donga</dc:creator>
      <guid isPermaLink="false">https://www.flexera.com/blog/?p=30786</guid>
      <description><![CDATA[Table of contents Do not edit: TOC will be auto-generated NIST has proposed a new metric to help IT teams prioritize vulnerabilities. The likely exploited vulnerability (LEV) augments, but does not replace, existing metrics like known exploited vulnerability (KEV) and Exploit Prediction Scoring System (EPSS) scores for more effective risk mitigation. NIST’s effort on LEV is meant to address a critical gap in vulnerability management. With tens of thousands of vulnerabilities published each year, only a small percentage are being actively exploited in the wild. Organizations are continuously challenged by allocating limited remediation resources effectively. Existing approaches—such as the EPSS&hellip;]]></description>
      <content:encoded><![CDATA[Table of contents Do not edit: TOC will be auto-generated NIST has proposed a new metric to help IT teams prioritize vulnerabilities. The likely exploited vulnerability (LEV) augments, but does not replace, existing metrics like known exploited vulnerability (KEV) and Exploit Prediction Scoring System (EPSS) scores for more effective risk mitigation. NIST’s effort on LEV is meant to address a critical gap in vulnerability management. With tens of thousands of vulnerabilities published each year, only a small percentage are being actively exploited in the wild. Organizations are continuously challenged by allocating limited remediation resources effectively. Existing approaches—such as the EPSS&hellip;]]></content:encoded>
          </item>
          <item>
      <title>4 lessons on software vulnerabilities from Verizon’s 2025 Data Breach Investigations Report</title>
      <link>https://www.flexera.com/blog/security/software-vulnerabilities-lessons-from-verizons-2025-data-breach-investigations-report/</link>
      <pubDate>Mon, 19 May 2025 13:00:29 +0000</pubDate>
      <dc:creator>Venkat Ram Donga</dc:creator>
      <guid isPermaLink="false">https://www.flexera.com/blog/?p=30395</guid>
      <description><![CDATA[Table of contents Do not edit: TOC will be auto-generated As someone who’s been immersed in cybersecurity for years, I couldn’t help but take a hard look at the findings in Verizon’s 2025 Data Breach Investigations Report. While the report covers a multitude of issues, one of the more startling findings is the growth in exploited software vulnerabilities. These vulnerabilities are no longer a minor afterthought; they’re swiftly becoming a primary entry point for cyberattacks. A rise in exploited vulnerabilities According to the report, exploitation of vulnerabilities has now become an initial access vector in about 20% of all breaches—a&hellip;]]></description>
      <content:encoded><![CDATA[Table of contents Do not edit: TOC will be auto-generated As someone who’s been immersed in cybersecurity for years, I couldn’t help but take a hard look at the findings in Verizon’s 2025 Data Breach Investigations Report. While the report covers a multitude of issues, one of the more startling findings is the growth in exploited software vulnerabilities. These vulnerabilities are no longer a minor afterthought; they’re swiftly becoming a primary entry point for cyberattacks. A rise in exploited vulnerabilities According to the report, exploitation of vulnerabilities has now become an initial access vector in about 20% of all breaches—a&hellip;]]></content:encoded>
          </item>
          <item>
      <title>Cybersecurity on the brink: MITRE’s urgent appeal for continuous CVE coverage</title>
      <link>https://www.flexera.com/blog/security/cybersecurity-on-the-brink-mitres-urgent-appeal-for-continuous-cve-coverage/</link>
      <pubDate>Wed, 16 Apr 2025 15:03:43 +0000</pubDate>
      <dc:creator>Venkat Ram Donga</dc:creator>
      <guid isPermaLink="false">https://www.flexera.com/blog/?p=30226</guid>
      <description><![CDATA[Update April 23, 2024: Table of contents Do not edit: TOC will be auto-generated In a statement from Matt Hartman, CISA Acting Executive Assistant Director for Cybersecurity, CISA confirmed that there &#8220;has been no interruption to the CVE program and CISA is fully committed to sustaining and improving this critical cyber infrastructure.&#8221; However, they also recognized that there is work to be done and that stability of international and private collaboration toward vulnerability standard is a requirement for a functioning global program.   In an alarming development for the cybersecurity community, MITRE—the organization responsible for operating the Common Vulnerabilities and Exposures&hellip;]]></description>
      <content:encoded><![CDATA[Update April 23, 2024: Table of contents Do not edit: TOC will be auto-generated In a statement from Matt Hartman, CISA Acting Executive Assistant Director for Cybersecurity, CISA confirmed that there &#8220;has been no interruption to the CVE program and CISA is fully committed to sustaining and improving this critical cyber infrastructure.&#8221; However, they also recognized that there is work to be done and that stability of international and private collaboration toward vulnerability standard is a requirement for a functioning global program.   In an alarming development for the cybersecurity community, MITRE—the organization responsible for operating the Common Vulnerabilities and Exposures&hellip;]]></content:encoded>
          </item>
          <item>
      <title>5 tips to achieve DORA compliance efficiently</title>
      <link>https://www.flexera.com/blog/security/5-tips-to-achieve-dora-compliance-efficiently/</link>
      <pubDate>Wed, 09 Apr 2025 18:57:05 +0000</pubDate>
      <dc:creator>Jeroen Braak</dc:creator>
      <guid isPermaLink="false">https://www.flexera.com/blog/?p=30219</guid>
      <description><![CDATA[Table of contents Do not edit: TOC will be auto-generated Since the EU started enforcing the Digital Operational Resilience Act (DORA) in January 2025, many companies in the finance sector as well as Information and Communications Technology (ICT) third-party providers have faced multiple challenges with the newer regulation. Many IT and security leaders within this area have tried and are still making a big effort to comply with the regulation but are unsure of everything it entails and how they should start their compliance journey. To achieve DORA compliance completely and efficiently, we’ve compiled the following list of five key&hellip;]]></description>
      <content:encoded><![CDATA[Table of contents Do not edit: TOC will be auto-generated Since the EU started enforcing the Digital Operational Resilience Act (DORA) in January 2025, many companies in the finance sector as well as Information and Communications Technology (ICT) third-party providers have faced multiple challenges with the newer regulation. Many IT and security leaders within this area have tried and are still making a big effort to comply with the regulation but are unsure of everything it entails and how they should start their compliance journey. To achieve DORA compliance completely and efficiently, we’ve compiled the following list of five key&hellip;]]></content:encoded>
          </item>
          <item>
      <title>Cyber-Resilience regulations are here—is your organization ready?</title>
      <link>https://www.flexera.com/blog/security/cyber-resilience-regulations-are-here-is-your-organization-ready/</link>
      <pubDate>Thu, 30 Jan 2025 02:41:09 +0000</pubDate>
      <dc:creator>Jennifer Kuvlesky</dc:creator>
      <guid isPermaLink="false">https://www.flexera.com/blog/?p=29885</guid>
      <description><![CDATA[Table of contents Do not edit: TOC will be auto-generated Recent regulations require organizations to demonstrate they are resilient to cyber-attacks. These regulations impact regulated organizations and those in the supply chain, as modern threat actors target vulnerabilities across the entire ecosystem. Cybersecurity has become a boardroom, high-priority agenda item with heightened legal exposure, increases in supply chain attacks, and reported vulnerabilities. Cybersecurity incidents are expensive. According to IBM’s 2024 data, the average cost of a data breach was $4.88 million. Beyond this, poor cybersecurity ratings can negatively impact credit scores, increasing borrowing costs and adding financial strain to already&hellip;]]></description>
      <content:encoded><![CDATA[Table of contents Do not edit: TOC will be auto-generated Recent regulations require organizations to demonstrate they are resilient to cyber-attacks. These regulations impact regulated organizations and those in the supply chain, as modern threat actors target vulnerabilities across the entire ecosystem. Cybersecurity has become a boardroom, high-priority agenda item with heightened legal exposure, increases in supply chain attacks, and reported vulnerabilities. Cybersecurity incidents are expensive. According to IBM’s 2024 data, the average cost of a data breach was $4.88 million. Beyond this, poor cybersecurity ratings can negatively impact credit scores, increasing borrowing costs and adding financial strain to already&hellip;]]></content:encoded>
          </item>
          <item>
      <title>Stay secure with top tips to navigate NIS2 compliance</title>
      <link>https://www.flexera.com/blog/security/stay-secure-with-top-tips-to-navigate-nis2-compliance/</link>
      <pubDate>Fri, 25 Oct 2024 21:35:37 +0000</pubDate>
      <dc:creator>Jeroen Braak</dc:creator>
      <guid isPermaLink="false">https://www.flexera.com/blog/?p=29734</guid>
      <description><![CDATA[Table of contents Do not edit: TOC will be auto-generated As cybersecurity threats continue to evolve, the European Union’s NIS2 Directive is pushing important, essential entities to adopt stricter cybersecurity measures. For organizations in critical sectors like finance, healthcare, energy, and digital infrastructure, NIS2 is more than just a regulatory challenge—it’s an opportunity to strengthen operational resilience and proactively manage cyber risks. So, how do organizations navigate these new regulatory requirements? To achieve full NIS2 compliance, businesses need to focus on vulnerability management, IT visibility, and incident prevention. Let’s start by understanding what NIS2 means for your organization and how&hellip;]]></description>
      <content:encoded><![CDATA[Table of contents Do not edit: TOC will be auto-generated As cybersecurity threats continue to evolve, the European Union’s NIS2 Directive is pushing important, essential entities to adopt stricter cybersecurity measures. For organizations in critical sectors like finance, healthcare, energy, and digital infrastructure, NIS2 is more than just a regulatory challenge—it’s an opportunity to strengthen operational resilience and proactively manage cyber risks. So, how do organizations navigate these new regulatory requirements? To achieve full NIS2 compliance, businesses need to focus on vulnerability management, IT visibility, and incident prevention. Let’s start by understanding what NIS2 means for your organization and how&hellip;]]></content:encoded>
          </item>
          <item>
      <title>Avoid missing crucial vulnerability intelligence amid NVD backlog</title>
      <link>https://www.flexera.com/blog/security/avoid-missing-crucial-vulnerability-intelligence-amid-nvd-backlog/</link>
      <pubDate>Tue, 09 Apr 2024 09:04:10 +0000</pubDate>
      <dc:creator>Venkat Ram Donga</dc:creator>
      <guid isPermaLink="false">https://www.flexera.com/blog/?p=27534</guid>
      <description><![CDATA[Table of contents Do not edit: TOC will be auto-generated Recent developments regarding the National Vulnerability Database (NVD) have some technology leaders on edge. Since February, the U.S. National Institute of Standards and Technology (NIST) has almost completely stopped enriching software vulnerabilities listed in its National Vulnerability Database (NVD), the world&#8217;s most widely used software vulnerability database. Because of this, we understand many technology leaders have concerns about potential delays in vulnerability analysis efforts. The NVD recently stated: There is a growing backlog of vulnerabilities submitted to the NVD and requiring analysis. This is based on a variety of factors,&hellip;]]></description>
      <content:encoded><![CDATA[Table of contents Do not edit: TOC will be auto-generated Recent developments regarding the National Vulnerability Database (NVD) have some technology leaders on edge. Since February, the U.S. National Institute of Standards and Technology (NIST) has almost completely stopped enriching software vulnerabilities listed in its National Vulnerability Database (NVD), the world&#8217;s most widely used software vulnerability database. Because of this, we understand many technology leaders have concerns about potential delays in vulnerability analysis efforts. The NVD recently stated: There is a growing backlog of vulnerabilities submitted to the NVD and requiring analysis. This is based on a variety of factors,&hellip;]]></content:encoded>
          </item>
          <item>
      <title>Understanding the complexities of vulnerability management</title>
      <link>https://www.flexera.com/blog/security/understanding-the-complexities-of-vulnerability-management/</link>
      <pubDate>Mon, 15 Jan 2024 17:50:58 +0000</pubDate>
      <dc:creator>Kevin Miller</dc:creator>
      <guid isPermaLink="false">https://www.flexera.com/blog/?p=27051</guid>
      <description><![CDATA[Table of contents Do not edit: TOC will be auto-generated Software vulnerabilities, often seen as mere technical glitches, have the potential to escalate into significant security breaches, which can affect not just your enterprise but also your stakeholders and customers. With the rapid evolution of cyber threats, organizations are in a race against time to identify and mitigate vulnerabilities. That&#8217;s why we&#8217;ve created Software Vulnerability Manager (SVM) and Software Vulnerability Research (SVR), designed to be at the forefront of this battle. The ever-present threat landscape Every day, countless new vulnerabilities are discovered, adding to an already extensive list. If left&hellip;]]></description>
      <content:encoded><![CDATA[Table of contents Do not edit: TOC will be auto-generated Software vulnerabilities, often seen as mere technical glitches, have the potential to escalate into significant security breaches, which can affect not just your enterprise but also your stakeholders and customers. With the rapid evolution of cyber threats, organizations are in a race against time to identify and mitigate vulnerabilities. That&#8217;s why we&#8217;ve created Software Vulnerability Manager (SVM) and Software Vulnerability Research (SVR), designed to be at the forefront of this battle. The ever-present threat landscape Every day, countless new vulnerabilities are discovered, adding to an already extensive list. If left&hellip;]]></content:encoded>
          </item>
          <item>
      <title>Application specialist and vulnerability management leaders forge partnership for secure patching process</title>
      <link>https://www.flexera.com/blog/security/vulnerability-management-leaders-forge-partnership-for-secure-patching/</link>
      <pubDate>Thu, 30 Mar 2023 12:00:24 +0000</pubDate>
      <dc:creator>Goziechi Nwabeke</dc:creator>
      <guid isPermaLink="false">https://www.flexera.com/blog/?p=26228</guid>
      <description><![CDATA[There’s no getting around it: Today’s digital world requires businesses to rely heavily on software to run their operations, manage data and communicate with customers. But this widespread use of software also presents a significant risk to cybersecurity. Hackers and cybercriminals hunt for vulnerabilities they can exploit in order to gain unauthorized access to sensitive data and disrupt operations. With the third highest vulnerabilities recently being reported since the Secunia Research Team started in 2002, managing software vulnerabilities is even more critical to protect your organization against attacks. A secure patch management process is required to ensure your software systems&hellip;]]></description>
      <content:encoded><![CDATA[There’s no getting around it: Today’s digital world requires businesses to rely heavily on software to run their operations, manage data and communicate with customers. But this widespread use of software also presents a significant risk to cybersecurity. Hackers and cybercriminals hunt for vulnerabilities they can exploit in order to gain unauthorized access to sensitive data and disrupt operations. With the third highest vulnerabilities recently being reported since the Secunia Research Team started in 2002, managing software vulnerabilities is even more critical to protect your organization against attacks. A secure patch management process is required to ensure your software systems&hellip;]]></content:encoded>
          </item>
          <item>
      <title>Prioritize vulnerability assessment more easily with these simple steps— and intelligence—from Secunia Research</title>
      <link>https://www.flexera.com/blog/security/prioritize-vulnerability-assessment-more-easily-with-these-simple-steps-and-intelligence-from-secunia-research/</link>
      <pubDate>Tue, 04 Oct 2022 14:29:16 +0000</pubDate>
      <dc:creator>Goziechi Nwabeke</dc:creator>
      <guid isPermaLink="false">https://www.flexera.com/blog/?p=25920</guid>
      <description><![CDATA[The cost of an exploited vulnerability due to a cyber-attack can be devastating to your business. Your confidential information, intellectual property, and employees are the valuable data points that make up your brand and must be protected. According to Forbes, cybercrimes are at an all-time high with external hackers being linked to 93 percent of reported cases. Simply focusing on patching the most common vulnerabilities is not enough and can leave you exposed to potential attacks. While running a successful business, it can feel overwhelming and impossible to know everything. However, with Flexera’s software vulnerability management solutions, you don’t have&hellip;]]></description>
      <content:encoded><![CDATA[The cost of an exploited vulnerability due to a cyber-attack can be devastating to your business. Your confidential information, intellectual property, and employees are the valuable data points that make up your brand and must be protected. According to Forbes, cybercrimes are at an all-time high with external hackers being linked to 93 percent of reported cases. Simply focusing on patching the most common vulnerabilities is not enough and can leave you exposed to potential attacks. While running a successful business, it can feel overwhelming and impossible to know everything. However, with Flexera’s software vulnerability management solutions, you don’t have&hellip;]]></content:encoded>
          </item>
  </channel>
</rss>
