ASUSTOR is authorized by the CVE Program as a CVE Numbering Authority (CNA)

The latest and greatest from ASUSTOR.
Locked
Eva.W@AST
Posts: 49
youtube meble na wymiar Warszawa
Joined: Mon Jul 19, 2021 12:22 pm

ASUSTOR is authorized by the CVE Program as a CVE Numbering Authority (CNA)

Post by Eva.W@AST »

[fimg=]https://images.benchmarkemail.com/clien ... 275854.png[/fimg]
Taiwan, Taipei, October 26, 2021 - ASUSTOR Inc. today announced that ASUSTOR has been authorized by the CVE Program as a CVE Numbering Authority (CNA). The CVE Program is an international, community-based effort and relies on the community to discover vulnerabilities. The vulnerabilities are discovered then assigned and published to the CVE List. With this, ASUSTOR will be able to integrate various information security notifications and announcements. When security is under threat, ASUSTOR can more easily take corresponding measures and raise warnings to help to prevent further attacks and enhance the security of ASUSTOR NAS devices.


The nature of attacks are changing with time and information security challenges are rising. With an endless amount of threats, it is imperative to use an ASUSTOR NAS to provide for a safer network environment as ASUSTOR has successfully obtained CNA official membership. ASUSTOR now accepts information security information from all over the world, and by assigning a CVE® ID to an ASUSTOR NAS, ASUSTOR can fully grasp any relevant information security issues to conduct investigations and issue security updates to improve safety of using an ASUSTOR NAS. ASUSTOR is committed to providing users with a stable and reliable storage solution.

About the CVE Program
The mission of the CVE Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There is one CVE Record for each vulnerability in the catalog. The vulnerabilities are discovered then assigned and published by organizations from around the world that have partnered with the CVE Program. Partners publish CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to ensure they are discussing the same issue, and to coordinate their efforts to prioritize and address the vulnerabilities.

Learn more here:https://www.asustor.com/security/security_advisory
Locked

Return to “Announcements”