ISO 27001: The right way to deal with technical vulnerabilities
Vulnerability management, catalog of measures, processes, tools, etc.: How can the requirements of the old and adapted ISO 27001 be met with regard to technical vulnerabilities? We answer the most important questions for companies.
Security Advisory 2110-01
Insecure data storage in Polar Flow Android application Overview Advisory ID: TRSA-2110-01 Advisory version: 1.0 Advisory status: Public Advisory URL: https://trovent.io/security-advisory-2110-01 Affected […]
Security Advisory 2108-01
User account enumeration in password reset function Overview Advisory ID: TRSA-2108-01 Advisory version: 1.0 Advisory status: Public Advisory URL: https://trovent.io/security-advisory-2108-01 Affected product: […]