By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
DaltonitDaltonitDaltonit
Search
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Leo’s Vendor Advisory Integrations for Cybersecurity Teams daltonit
Share
Sign In
Notification Show More
Font ResizerAa
DaltonitDaltonit
Font ResizerAa
Search
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
SCIENCE

Leo’s Vendor Advisory Integrations for Cybersecurity Teams daltonit

Dalton
Last updated: 1:55 am
Dalton
Share
4 Min Read
SHARE


Contents
TRanscript New Leo CVE Skill – Vendor Advisory IntegrationsWhich vendor advisories does Leo integrate with already?I don’t see a vendor advisory I need on this list – can you add it?You might also be interested inResearch critical vulnerabilities with the Leo CVE DashboardHow an Australian energy provider stays on top of critical cyber threats with Feedly
What’s New
Leo is now integrated with 15 vendor advisories, giving you real-time access to relevant CVE and CVSS information, directly in your feed.

TRanscript
New Leo CVE Skill – Vendor Advisory Integrations

“Hi folks, this is Remi from Feedly. I wanted to share with you the latest updates on the Leo cybersecurity skills, which has to do with vendor advisory integration. Very exciting one.

The premise for this is that we’ve heard from a lot of our customers that connecting Leo’s knowledge graph directly to vendor advisory sites would be highly beneficial to get updates on CVEs faster, basically immediately as they get published on those vendor sites.

So we built it as you can see, we started integration with the most prominent vendor sites, as you can see here. So we’ve got our Microsoft, Oracle, Cisco if you have any vendor of choice that is not in this list, please let us know because we’re continuously adding more vendor sites to to the knowledge graph. Your feedback is important and will be taken into consideration.

To show you what that looks like, if you take a look at your Today page and your CVE dashboard and your trending vulnerabilities on the right hand side, you can zoom in to this latest vulnerability for Microsoft from a couple of days ago. Click on the CVSS score, which just normally just opens up the NVD page for that vulnerability, you can see that at the NVD level, this is still under undergoing analysis. And there isn’t much detail about it yet on the Phoebe side of things.

Thanks to Leo, you still have all of the elements that appear over here, as well as your usual reference articles and all the chatter around that particular CVE. This is because Leo is picking up that information directly from the Microsoft site and makes all of these updates again, almost in real time. So the outcome of this is that you can really be aware of what’s happening around these critical vulnerabilities sooner without having to go individually to all these other sites and looking up IDs.”

Which vendor advisories does Leo integrate with already?

Tenable, Mozilla, Google Android, Microsoft MSRC, Cisa, Google Chrome, F5, Cisco, Apple, Redhat, zdi, CERT/CC, Oracle, Rapid7, Palo Alto Networks, Dell, Adobe, Apache, Checkpoint, IBM, Siemens, Juniper, Jenkins, OpenVPN AS, Apache Tomcat, ElasticSearch, Google Cloud, NGINX, Haproxy, SAP, CNA vendors NVD, ISC, Netapp, Atlassian

I don’t see a vendor advisory I need on this list – can you add it?

Yes! Contact your Customer Success Manager and we are happy to connect additional vendor advisories for you.

You might also be interested in

Research critical vulnerabilities with the Leo CVE Dashboard

Contextualized CVE information for faster threat research, without the overwhel

How an Australian energy provider stays on top of critical cyber threats with Feedly

This analyst team designed AI-powered security Feeds in Feedly that proactively alert them about specific topics, threats, and threat actor


Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article How one tech exec used Feedly to power his passion project – Feedly Blog daltonit
Next Article Cyber Threat Intelligence Case Study in the Energy Industry daltonit
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • SUI crypto surges over 30% as meme coins gain traction daltonit
  • Aptos Foundation invests in Universal Health Token to advance decentralized healthcare daltonit
  • Prompt engineering: conduct a Diamond Model of Intrusion Analysis daltonit
  • US court permits Three Arrows Capital to expand claim against FTX, rejects FTX’s objections daltonit
  • VanEck research reveals if Strategic Bitcoin Reserve can pay off US debt by 2049 daltonit

Recent Comments

  • Connor on Here’s Why Business Needs a Mobile-Friendly Website
  • Connor on Here’s Why Business Needs a Mobile-Friendly Website
  • Connor on Here’s Why Business Needs a Mobile-Friendly Website

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • SUI crypto surges over 30% as meme coins gain traction daltonit
  • Aptos Foundation invests in Universal Health Token to advance decentralized healthcare daltonit
  • Prompt engineering: conduct a Diamond Model of Intrusion Analysis daltonit
  • US court permits Three Arrows Capital to expand claim against FTX, rejects FTX’s objections daltonit
  • VanEck research reveals if Strategic Bitcoin Reserve can pay off US debt by 2049 daltonit

Search

Follow US
Daltonit. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up