The Common Vulnerability Scoring System has a lot of critics, but experts say it’s still the best unified way to share the severity of cybersecurity flaws.
A digitally generated image of yellow data server discs organized into circular pattern is seen against on beige background. (Andriy Onufriyenko via GettyImages)
The National Vulnerability Database has ceased some of its work, but some experts fear the formation of a consortium to address its problems lacks sufficient urgency.
Tesla CEO Elon Musk smiles as he addresses guests at the Offshore Northern Seas 2022 (ONS) meeting in Stavanger, Norway on August 29, 2022. (Photo by CARINA JOHANSEN/NTB/AFP via Getty Images)
Tim Rudolph, Air Force Life Cycle Management Center chief technology officer, moderates a panel discussion titled “It’s Raining Data Centers” at the MITRE Corporation complex in Bedford, Mass., in 2014. MITRE is under pressure from Congress to change the way it handles the CVE process. (U.S. Air Force / Jerry Saslav)
The industry-wide program for naming and documenting vulnerabilities suffers from fluctuating funding and insufficient oversight, according to a House panel.
There is a median lag time of approximately seven days between when someone discovers an exploitable software vulnerability and its eventual release on NIST's National Vulnerability Database,…