Here’s some great news on the security front: Tenable®, the Exposure Management company, has created a new Research Alliance Program to share vulnerability information prior to public disclosure, and we are thrilled to share that we’re one of the five inaugural members of this growing network.
This new intelligence sharing initiative aims to reduce the window of opportunity threat actors have to exploit newly-disclosed vulnerabilities, allowing security teams and system administrators to address attack paths before hackers can take advantage.
When a new vulnerability is disclosed, organizations are in a race against hackers. Those tasked with securing the organization must work to identify if the flaw exists within their infrastructure, determine the risk it poses by identifying the attack paths it introduces, prioritize those weaknesses that pose the greatest threat, before either updating the software where a patch is available or take mitigating action when this is not immediately feasible. This takes time and leaves the organization exposed. In tandem, threat actors will be scanning for the vulnerability and developing ways to weaponize the flaw.
By establishing a framework for a network of technology partners to share vulnerability details in accordance with Coordinated Vulnerability Disclosure (CVD) best practices, it makes it more likely that software scripts (plugins) to find instances of the flaw can be developed, tested, and deployed to coincide with public disclosure announcements, enabling organizations to assess and remediate their environments on day zero. This means those tasked with vulnerability management don’t just have the same intelligence as threat actors, but are armed to take action to find and fix flaws before an attacker can exploit them.
We’re excited to demonstrate our commitment to open source security by joining Tenable’s Research Alliance Program, and we’re looking forward to working with Tenable and the Rocky Linux open source community to create a more secure software supply chain.