Big Board

Content Ideas
Result Content Idea Research
Result Content Idea Research
1 The History of Common Vulnerabilities and Exposures (CVE)
2 CISA-Sponsored CVE Program Grants Nozomi Networks CNA Status
3 WhatsApp Has Just Confirmed These 5 Critical Security Vulnerabilities
4 WhatsApp revealed six vulnerabilities
5 September Microsoft Security Patches Address 129 Vulnerabilities
6 Could Exposure to the Common Cold Reduce the Severity of COVID-19 Infection?
7 VMware Workstation Pro 16.0
8 How to explain CVE, Common Vulnerabilities and Exposures, in plain English
9 MITRE releases 2020 CWE Top 25 most dangerous software weaknesses
10 CISA to oversee CVE numbering authorities for industrial control systems and medical devices
11 Hackers Connected to China Have Compromised U.S. Government Systems, CISA says
12 Sysdig partners with VulnDB to strengthen vulnerability intelligence reporting
13 Why Application Security is Important to Vulnerability Management
14 An Introduction to Software Vulnerabilities
15 SonicWall suffers security vulnerability, affecting millions of managed devices and organizations
16 What is CVE, its definition and purpose?
17 Puzzled scientists seek reasons behind Africa's low fatality rates from pandemic
18 US CISA describes Chinese MSS cyber collection techniques. Two-factor bypass. Access keys exposed during software development.
19 Top 5 Vulnerability Scanners You Need to Patrol Security Grids
20 Prior exposure to powdery mildew makes plants more vulnerable to subsequent disease
21 Why You Need Full Visibility to Manage Common Vulnerabilities and Exposures (CVE)
22 Embedding Environmental Factors In Strategy And Risk Management: For Banks, A Long Journey Just Begun
23 University workers' job fears over Covid-19 exposure
24 Is if COVID-19 or the flu? What doctors say about the symptoms
25 Privacy Concerns Hindering Digital Contact Tracing
26 2019 was a record year for OSS vulnerabilities
27 Combating the Continuous Development of Vulnerable Software
28 Throughout pandemic, sickle cell patients suffer quietly at home
29 Write Code That Protects Sensitive User Data
30 As wildfires break records, firefighters face growing health risks
31 Top 10 Routinely Exploited Vulnerabilities – Homeland Security Today
32 Lack of Key Considerations in FDA Food Chemical Safety Process Leaves Consumers at Risk of Chronic Diseases
33 Happy Birthday, CVE!
34 CVE program marks 20th anniversary as registered security vulnerabilities soar
35 It’s Time to Broaden the Definition of a Vulnerability
36 A bout of powdery mildew leaves plants vulnerable
37 Study: Air pollution linked to more strokes in people with Afib
38 Worn-out bodies and little savings – Finance & Commerce
39 Recorder's office offers protection from elder abuse and fraud
40 Why developers need a supplemental source to NVD vulnerability data
41 Understanding the Underlying Neurobiology Behind Group Differences in Cortical Thickness Across Psychiatric Disorders
42 Rust Belt Workers Left to Fend for Themselves
43 Making Cybersecurity a Priority in the Boardroom
44 Application Risk Is 1.7x Higher for Organizations That Fail to Manage Security Debt
45 50 cities facing more extreme heat in 2020
46 Last Year’s Surge in Exploited Security Vulnerabilities for Open Source Projects Could Be Surpassed in 2020
47 Dems unveil $2.2 trillion COVID stimulus plan; Fauci warns U.S. is ‘not in a good place’; CDC suggests avoidin
48 Most Organizations Have Incomplete Vulnerability ...
49 Wind River Four-Step Procedure to Secure Linux-Based Systems
50 How do children fight off the coronavirus?
51 Preventative nasal spray shown to reduce viral replication by up to 96% in COVID-19 challenge study
52 Top 25 software vulnerabilities
53 Coronavirus news from the Bay Area: Sept. 24-25
54 Experts answer your COVID-19 questions: “If I was in contact with someone who had COVID-19, how soon would I start seeing the effects and the symptoms?”
55 June 2020 Patch Tuesday Commentary
56 Zoom patches zero‑day flaw in Windows client
57 Focused on application vulnerabilities? You're missing the bigger picture
58 The Top 10 Routinely Exploited Vulnerabilities
59 Need to ensure countries take their obligations seriously to combat climate change: India
60 Spike in COVID-19 cases shows “virus is sticking around" as anti-mask protests persist
61 MITRE, CISA, DHS Announce 25 Most Dangerous Software Errors
62 COVID-19 Emergency Prep: Are You Ready for What's Next?
63 Internet security is improving, but exposures still run rampant
64 OPINION: World Rabies Day
65 How Useful Is MITRE's '25 Most Dangerous Software Errors' List?
66 Microsoft May Security Patch Bundle Addresses 111 Vulnerabilities
67 Top Ten Cybersecurity Vulnerabilities Government Alert
68 Could a pesticide harm our defense against COVID-19?
69 Social media faster than official sources to identify software flaws
70 Trump's Failure on Covid-19 Testing and Tracking Data Has Led to Deaths of 1,700 Healthcare Workers, Nurses Union Report Shows
71 Most ICS vulnerabilities disclosed this year can be exploited remotely
72 Suicide Contagion in Shakespeare's Hamlet
73 Microsoft's February Security Patches Bringing 12 Critical Fixes
74 Microsoft July Security Updates Address 18 Critical Vulnerabilities, Including One That's 'Wormable'
75 Why police use of tear gas should be banned
76 Client Alert: Office of Civil Rights (OCR) Publishes List of Top 10 Cybersecurity System Vulnerabilities
77 New Breach Leaks More Than 900 Enterprise Credentials
78 What is Hyperpigmentation? What to Know About Dark Spots and Skin Discoloration
79 Top 10 most exploited vulnerabilities list released by FBI, DHS CISA
80 Vulnerability Management Isn't Just a Numbers Game
81 How to Source Vulnerability Data for True DevSecOps
82 MNA Brigham and Women's Hospital Nurses Urge Executives to Use Stronger Safety Measures to Properly Contain Ongoing COVID-19 Cluster
83 Nation state APT groups prefer old, unpatched vulnerabilities
84 Microsoft Delivers Patches for 120 Flaws with August Security Release
85 The Moral Case for Reopening Schools—Without Masks
86 Population movement baseline report: Movement and displacement in South Sudan, 1983-2019 (September 2020)
87 Digital technologies will help build resilient communities after the coronavirus pandemic
88 8 of the 10 Most Exploited Bugs Last Year Involved ...
89 Intel pushes for hardware-specific additions to vulnerability taxonomy
90 The most exploited software vulnerabilities of 2019
91 The Risks Associated with OSS and How to Mitigate Them
92 FDA Action Alert: Aquestive, Eton and Mesoblast
93 Microsoft Delivers Hefty April Security Patch Bundle
94 NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems
95 ClickShare Vulnerabilities May Have Been Patched, But They Mask a Much Bigger Problem
96 4 vulnerabilities and exposures affect Intel-based systems; Red Hat responds
97 ICS vulnerabilities on rise as reliance on remote access to industrial networks increases during COVID-19
98 Thinking Outside the National Vulnerability Database Box
99 A case for establishing a common weakness enumeration for hardware security
100 Week in review: MongoDB attacks, hackers hitting F5 BIG-IP, Citrix devices, Patch Tuesday forecast