www.securin.io Open in urlscan Pro
143.204.98.94  Public Scan

URL: https://www.securin.io/disclosure-policy/
Submission: On September 06 via api from TR — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * Products
   * Attack Surface Management
   * Vulnerability Intelligence
   
   
   ATTACK SURFACE MANAGEMENT
   
   
   
   Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans
   for exposures in your known & unknown assets.
   
   SIGN-UP FOR ASM
   
   
   
   
   VULNERABILITY INTELLIGENCE
   
   
   
   Our VI platform delivers threat intelligence & context on the latest cyber
   threats providing you with actionable insights for remediation.
   
   REQUEST A DEMO
 * Services
   * Vulnerability Management
   * Penetration Testing
   
   
   VULNERABILITY MANAGEMENT
   
   
   
   Our vulnerability management continually detects, prioritizes, & plans
   remediation to protect your entire IT landscape.
   
   
   
   
   
   PENETRATION TESTING
   
   
   
   Our penetration testing simulates a real-world attack on your digital assets
   to determine the strength of your security & defenses.

 * Use Cases
   * Attack Surface Management
   * Continuous Attack Surface Reduction
   * Discovery of Known & Unknown Assets
   * Assets with Known Ransomware & Exploitable Vulnerabilities
   * Non-Production Systems Exposed to the Public
   * Monitor Subsidiaries & Acquisitions
   * Vulnerability Intelligence
   * Early Warning Risk Alerts
   * Vulnerability Prioritization
   * Tech Stack Alerting
   * Actionable Threat Intelligence
   * Penetration Testing
   * Network & Infrastructure Penetration Testing
   * Meet your Compliance Requirements
   * Test Your Security Resilience
   * Protect Intellectual Property
   * Vulnerability Management
   * Manage Vulnerabilities & Exposures
   * Network & Application Vulnerability Management
   * Threat & Vulnerability Advisories
   * Vulnerability Validation & False Positive Elimination
   Continuous Attack Surface Reduction
   Discovery of Known & Unknown Assets
   Assets with Known Ransomware & Exploitable Vulnerabilities
   Non-Production Systems Exposed to the Public
   Monitor Subsidiaries & Acquisitions
   Manage Vulnerabilities & Exposures
   Network & Application Vulnerability Management
   Threat & Vulnerability Advisories
   Vulnerability Validation & False Positive Elimination
   
   Early Warning Risk Alerts
   Vulnerability Prioritization
   Tech Stack Alerting
   Actionable Threat Intelligence
   Network & Infrastructure Penetration Testing
   Meet your Compliance Requirements
   Test Your Security Resilience
   Protect Intellectual Property
   
   
 * Partners
   * Partner Program
   * Become a Partner
   * Register a Deal
   
   
   PARTNERS
   
   
   
   As a partner led organization, we are committed to working with our partners
   to deliver world-class early warning security intelligence solutions that
   eliminate the adversary advantage & deliver superior security outcomes for
   your clients.
   
   
   Partner Program
   Become a Partner
   Register a Deal
 * Resources
   * Reports
   * Zero Days
   * Articles
   * Patch Watch
   * Webinars & Podcasts
   * Exclusive Threat Insights
   * Media Coverage
   * Glossary
   
   
   RESOURCES
   
   
   Reports
   Zero Days
   Articles
   Patch Watch
   Webinars & Podcasts
   Exclusive Threat Insights
   Media Coverage
   Glossary
 * About
   * Overview
   * Careers USA
   
   
   WHO WE ARE
   
   
   Overview
   
   
   
   
   CAREERS
   
   
   USA OPPORTUNITIES


X

Get Started!
 * Products
   * Attack Surface Management
   * Vulnerability Intelligence
   
   
   ATTACK SURFACE MANAGEMENT
   
   
   
   Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans
   for exposures in your known & unknown assets.
   
   SIGN-UP FOR ASM
   
   
   
   
   VULNERABILITY INTELLIGENCE
   
   
   
   Our VI platform delivers threat intelligence & context on the latest cyber
   threats providing you with actionable insights for remediation.
   
   REQUEST A DEMO
 * Services
   * Vulnerability Management
   * Penetration Testing
   
   
   VULNERABILITY MANAGEMENT
   
   
   
   Our vulnerability management continually detects, prioritizes, & plans
   remediation to protect your entire IT landscape.
   
   
   
   
   
   PENETRATION TESTING
   
   
   
   Our penetration testing simulates a real-world attack on your digital assets
   to determine the strength of your security & defenses.

 * Use Cases
   * Attack Surface Management
   * Continuous Attack Surface Reduction
   * Discovery of Known & Unknown Assets
   * Assets with Known Ransomware & Exploitable Vulnerabilities
   * Non-Production Systems Exposed to the Public
   * Monitor Subsidiaries & Acquisitions
   * Vulnerability Intelligence
   * Early Warning Risk Alerts
   * Vulnerability Prioritization
   * Tech Stack Alerting
   * Actionable Threat Intelligence
   * Penetration Testing
   * Network & Infrastructure Penetration Testing
   * Meet your Compliance Requirements
   * Test Your Security Resilience
   * Protect Intellectual Property
   * Vulnerability Management
   * Manage Vulnerabilities & Exposures
   * Network & Application Vulnerability Management
   * Threat & Vulnerability Advisories
   * Vulnerability Validation & False Positive Elimination
   Continuous Attack Surface Reduction
   Discovery of Known & Unknown Assets
   Assets with Known Ransomware & Exploitable Vulnerabilities
   Non-Production Systems Exposed to the Public
   Monitor Subsidiaries & Acquisitions
   Manage Vulnerabilities & Exposures
   Network & Application Vulnerability Management
   Threat & Vulnerability Advisories
   Vulnerability Validation & False Positive Elimination
   
   Early Warning Risk Alerts
   Vulnerability Prioritization
   Tech Stack Alerting
   Actionable Threat Intelligence
   Network & Infrastructure Penetration Testing
   Meet your Compliance Requirements
   Test Your Security Resilience
   Protect Intellectual Property
   
   
 * Partners
   * Partner Program
   * Become a Partner
   * Register a Deal
   
   
   PARTNERS
   
   
   
   As a partner led organization, we are committed to working with our partners
   to deliver world-class early warning security intelligence solutions that
   eliminate the adversary advantage & deliver superior security outcomes for
   your clients.
   
   
   Partner Program
   Become a Partner
   Register a Deal
 * Resources
   * Reports
   * Zero Days
   * Articles
   * Patch Watch
   * Webinars & Podcasts
   * Exclusive Threat Insights
   * Media Coverage
   * Glossary
   
   
   RESOURCES
   
   
   Reports
   Zero Days
   Articles
   Patch Watch
   Webinars & Podcasts
   Exclusive Threat Insights
   Media Coverage
   Glossary
 * About
   * Overview
   * Careers USA
   
   
   WHO WE ARE
   
   
   Overview
   
   
   
   
   CAREERS
   
   
   USA OPPORTUNITIES


X

Get Started!
 * Products
   * Attack Surface Management
   * Vulnerability Intelligence
   
   
   ATTACK SURFACE MANAGEMENT
   
   
   
   Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans
   for exposures in your known & unknown assets.
   
   SIGN-UP FOR ASM
   
   
   
   
   VULNERABILITY INTELLIGENCE
   
   
   
   Our VI platform delivers threat intelligence & context on the latest cyber
   threats providing you with actionable insights for remediation.
   
   REQUEST A DEMO
 * Services
   * Vulnerability Management
   * Penetration Testing
   
   
   VULNERABILITY MANAGEMENT
   
   
   
   Our vulnerability management continually detects, prioritizes, & plans
   remediation to protect your entire IT landscape.
   
   
   
   
   
   PENETRATION TESTING
   
   
   
   Our penetration testing simulates a real-world attack on your digital assets
   to determine the strength of your security & defenses.

 * Use Cases
   * Attack Surface Management
   * Continuous Attack Surface Reduction
   * Discovery of Known & Unknown Assets
   * Assets with Known Ransomware & Exploitable Vulnerabilities
   * Non-Production Systems Exposed to the Public
   * Monitor Subsidiaries & Acquisitions
   * Vulnerability Intelligence
   * Early Warning Risk Alerts
   * Vulnerability Prioritization
   * Tech Stack Alerting
   * Actionable Threat Intelligence
   * Penetration Testing
   * Network & Infrastructure Penetration Testing
   * Meet your Compliance Requirements
   * Test Your Security Resilience
   * Protect Intellectual Property
   * Vulnerability Management
   * Manage Vulnerabilities & Exposures
   * Network & Application Vulnerability Management
   * Threat & Vulnerability Advisories
   * Vulnerability Validation & False Positive Elimination
   Continuous Attack Surface Reduction
   Discovery of Known & Unknown Assets
   Assets with Known Ransomware & Exploitable Vulnerabilities
   Non-Production Systems Exposed to the Public
   Monitor Subsidiaries & Acquisitions
   Manage Vulnerabilities & Exposures
   Network & Application Vulnerability Management
   Threat & Vulnerability Advisories
   Vulnerability Validation & False Positive Elimination
   
   Early Warning Risk Alerts
   Vulnerability Prioritization
   Tech Stack Alerting
   Actionable Threat Intelligence
   Network & Infrastructure Penetration Testing
   Meet your Compliance Requirements
   Test Your Security Resilience
   Protect Intellectual Property
   
   
 * Partners
   * Partner Program
   * Become a Partner
   * Register a Deal
   
   
   PARTNERS
   
   
   
   As a partner led organization, we are committed to working with our partners
   to deliver world-class early warning security intelligence solutions that
   eliminate the adversary advantage & deliver superior security outcomes for
   your clients.
   
   
   Partner Program
   Become a Partner
   Register a Deal
 * Resources
   * Reports
   * Zero Days
   * Articles
   * Patch Watch
   * Webinars & Podcasts
   * Exclusive Threat Insights
   * Media Coverage
   * Glossary
   
   
   RESOURCES
   
   
   Reports
   Zero Days
   Articles
   Patch Watch
   Webinars & Podcasts
   Exclusive Threat Insights
   Media Coverage
   Glossary
 * About
   * Overview
   * Careers USA
   
   
   WHO WE ARE
   
   
   Overview
   
   
   
   
   CAREERS
   
   
   USA OPPORTUNITIES


X

Get Started!
 * Products
   * Attack Surface Management
   * Vulnerability Intelligence
   
   
   ATTACK SURFACE MANAGEMENT
   
   
   
   Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans
   for exposures in your known & unknown assets.
   
   SIGN-UP FOR ASM
   
   
   
   
   VULNERABILITY INTELLIGENCE
   
   
   
   Our VI platform delivers threat intelligence & context on the latest cyber
   threats providing you with actionable insights for remediation.
   
   REQUEST A DEMO
 * Services
   * Vulnerability Management
   * Penetration Testing
   
   
   VULNERABILITY MANAGEMENT
   
   
   
   Our vulnerability management continually detects, prioritizes, & plans
   remediation to protect your entire IT landscape.
   
   
   
   
   
   PENETRATION TESTING
   
   
   
   Our penetration testing simulates a real-world attack on your digital assets
   to determine the strength of your security & defenses.

 * Use Cases
   * Attack Surface Management
   * Continuous Attack Surface Reduction
   * Discovery of Known & Unknown Assets
   * Assets with Known Ransomware & Exploitable Vulnerabilities
   * Non-Production Systems Exposed to the Public
   * Monitor Subsidiaries & Acquisitions
   * Vulnerability Intelligence
   * Early Warning Risk Alerts
   * Vulnerability Prioritization
   * Tech Stack Alerting
   * Actionable Threat Intelligence
   * Penetration Testing
   * Network & Infrastructure Penetration Testing
   * Meet your Compliance Requirements
   * Test Your Security Resilience
   * Protect Intellectual Property
   * Vulnerability Management
   * Manage Vulnerabilities & Exposures
   * Network & Application Vulnerability Management
   * Threat & Vulnerability Advisories
   * Vulnerability Validation & False Positive Elimination
   Continuous Attack Surface Reduction
   Discovery of Known & Unknown Assets
   Assets with Known Ransomware & Exploitable Vulnerabilities
   Non-Production Systems Exposed to the Public
   Monitor Subsidiaries & Acquisitions
   Manage Vulnerabilities & Exposures
   Network & Application Vulnerability Management
   Threat & Vulnerability Advisories
   Vulnerability Validation & False Positive Elimination
   
   Early Warning Risk Alerts
   Vulnerability Prioritization
   Tech Stack Alerting
   Actionable Threat Intelligence
   Network & Infrastructure Penetration Testing
   Meet your Compliance Requirements
   Test Your Security Resilience
   Protect Intellectual Property
   
   
 * Partners
   * Partner Program
   * Become a Partner
   * Register a Deal
   
   
   PARTNERS
   
   
   
   As a partner led organization, we are committed to working with our partners
   to deliver world-class early warning security intelligence solutions that
   eliminate the adversary advantage & deliver superior security outcomes for
   your clients.
   
   
   Partner Program
   Become a Partner
   Register a Deal
 * Resources
   * Reports
   * Zero Days
   * Articles
   * Patch Watch
   * Webinars & Podcasts
   * Exclusive Threat Insights
   * Media Coverage
   * Glossary
   
   
   RESOURCES
   
   
   Reports
   Zero Days
   Articles
   Patch Watch
   Webinars & Podcasts
   Exclusive Threat Insights
   Media Coverage
   Glossary
 * About
   * Overview
   * Careers USA
   
   
   WHO WE ARE
   
   
   Overview
   
   
   
   
   CAREERS
   
   
   USA OPPORTUNITIES


X

Get Started!


DISCLOSURE POLICY




OUR VALUES

Securin, Inc. (Securin) as a security service provider and research organization
strongly believes that a constructive and coordinated disclosure is the best
approach to address and fix a vulnerability. We also believe that these
contributions to the security community will be helpful to reduce attack
surfaces or vectors against diverse and ever changing threats.


SCOPE

Securin vulnerability disclosure policy applies to any third party vendor
products to whom Securin will assign the CVEs for vulnerabilities, if the
product is not a part of another CVE Numbering Authority (CNA) scope.


POLICY

ONCE A SECURITY ISSUE IS FOUND THE FOLLOWING STEPS WILL BE TAKEN BY SECURIN TO
NOTIFY THE RESPECTIVE PARTIES TO FIX IT.

 * Once we have confirmed the vulnerability, we will gather all the necessary
   information to communicate the details to the affected party.

 * Securin will try to establish initial contact with the affected vendor via
   email regarding the vulnerability with all the supporting documents.

 * If we don’t receive a response from the vendor within seven days of sending
   the mail, another reminder will be sent. If the vendor did not respond or
   refuses to acknowledge the vulnerability within 14 days from initial contact,
   Securin will publicly disclose the vulnerability.

 * If we receive a response from the vendor, we will notify them about the date
   of the vulnerability disclosure that we have set.

 * The vendor will be allowed 90 days to provide a patch or relevant fix for the
   issue. If provided, then the vulnerability will be disclosed immediately
   following the vendor’s patch or fix release.

 * If a fix is not provided within the 90 day period and no response is received
   from the vendor, then we will go ahead and disclose the vulnerability on the
   afford-mentioned date.

 * In the event that the vendor is unable to provide a fix within the deadline,
   but has communicated Securin regarding the same, then the deadline could be
   adjusted. A maximum of six months of coordination will be given to the vendor
   for fixing the vulnerabilities. After that the vendor will be informed and
   the vulnerability will be disclosed regardless of the fix.

 * The 90-day deadline mentioned above is not a hard deadline. Securin can
   shorten or lengthen the deadline based on certain criteria like the severity
   of the vulnerability, ease of exploitation, etc.

 * Until the completion of the disclosure process, Securin will maintain
   confidentiality of any communication to and from the vendor. However, we will
   disclose the vulnerability to the public irrespective of the vendor’s support
   or not.

 * All the CVEs assigned by Securin and its vulnerability disclosures can be
   found in the Securin Zero Days List. Only the advisories present in the
   security advisory will be considered as official documents.

Securin is always open to feedback and suggestions. If you would like to contact
us, please feel free to email at disclose@securin.io 

Securin helps leaders continuously improve their security posture. We work as an
extension of your team to better protect your organization.

 * Privacy Policy | Customer Agreements

CONTACT

 * 2440 Louisiana Blvd NE #560, Albuquerque, NM 87110
 * 505-302-1113
 * info@securin.io

SECURITY SOLUTIONS

 * Attack Surface Management
 * Vulnerability Intelligence
 * Vulnerability Management
 * Penetration Testing

RESOURCE CENTER

 * Ransomware Old
 * Zero Days
 * Articles
 * Patch Watch

 * 
 * 
 * 
 * 
 * 

© Copyright 2023 Securin All Rights Reserved
11497