Rethink Vulnerability Management

Faraday Blog

Create Resistance. Be one step ahead. A security platform to manage everything from one place.

Faraday Security v5.10 & v5.11: Latest Enhancements for Faster Threat Detection

We’re thrilled to kick off the year with a series of enhancements and new features for our vulnerability management platform! One of the highlights is the release of Dark Mode, giving you the flexibility to tailor your view preferences.

Read More


CVSS v4: What’s New and Why It Matters for Your Vulnerability Management

In the ever-evolving landscape of cybersecurity, staying ahead of potential threats requires robust tools and accurate frameworks for assessing risk. The Common Vulnerability Scoring System (CVSS) has long been a cornerstone for evaluating vulnerabilities, providing a standardized method to gauge their severity. With the release of version 4.0, CVSS introduces significant updates aimed at improving accuracy and decision-making for security teams.

Read More


Release v5.9.0

At Faraday, our focus is on simplifying the complex and delivering solutions that empower security professionals. With these updates, we’re reaffirming our dedication to innovation, automation, and usability while maintainin the highest security standards—because managing risks and vulnerabilities shouldn’t slow you down.

Read More


Release v5.7.0

We’ve just released an update that brings significant improvements to Faraday, focusing on solving key challenges in vulnerability management. Here’s what’s new in Release 5.6.0 and Hotfix 5.6.1, and how these enhancements will make your workflow more efficient and secure

Read More


Maturity Models in Vulnerability Management: Where Are You At?

Since organizations differ in size, structure, and maturity, there are various vulnerability management models tailored to each. These strategies, adapted to different levels of complexity, are not a one-size-fits-all solution, but rather a set of recommended steps to either build a Vulnerability Management Program (VMP) from the ground up or assess the maturity of an existing VMP. The ultimate goal is to reach a point where vulnerability management no longer feels like a burden, but instead leads to significant improvements in overall security.

Read More


Expanded Attack Surface: How to Optimize Time and Resources in Cybersecurity

Security teams of all sizes, from large Fortune 500 companies to small NGOs, face the same problem: a lack of time and an ever-expanding attack surface. Time to detect vulnerabilities, time to decide what to do, time to act, and time to allocate resources. It is a continuous and constant game in which it is essential to focus on finding a more agile framework to detect, act, and resolve vulnerabilities.

Read More


Privacy Preference Center