Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/showpost/34324.aspx
INSIGHTS

Milestone Systems joins CVE Program to enhance cybersecurity transparency

Milestone Systems joins CVE Program to enhance cybersecurity transparency
The community-based program aims to identify, define, and catalog publicly disclosed vulnerabilities.
Milestone Systems, a leading provider of video technology, has partnered with the Common Vulnerability and Exposures (CVE) Program as a CVE Numbering Authority (CNA).

The aim of the program is to find, describe, and catalog known cybersecurity issues. Organizations worldwide, working with the program, find and share these vulnerabilities. They publish CVE Records with clear details about the issues to help IT and cybersecurity experts talk about the same problem and work together to fix it.

Thomas Jensen, CEO of Milestone Systems said: “Milestone Systems is committed to transparency in cybersecurity across our business. As Responsible Technology becomes a license to operate, we believe that people have the right to feel safe knowing that they can trust video technology.

“As a CVE Program partner, we will now publish mitigated vulnerabilities to the wider community, which will allow Milestone to coordinate and address potential issues even more effectively. This will further enhance our cybersecurity and continue to build trust in our XProtect open platform video management software.”

Cybersecurity vulnerabilities will continue to be reported via Milestone’s website. The registration will now be under CVE ID numbers and vulnerabilities and mitigations will be accessible through Milestone’s profile on the CVE website, as well as milestonesys.com.

About the CVE Program

The mission of the CVE Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There is one CVE Record for each vulnerability in the catalog. The vulnerabilities are discovered then assigned and published by organizations from around the world that have partnered with the CVE Program. Partners publish CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to ensure they are discussing the same issue, and to coordinate their efforts to prioritize and address the vulnerabilities.


Product Adopted:
Software
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: