www.securin.io
Open in
urlscan Pro
143.204.98.94
Public Scan
URL:
https://www.securin.io/disclosure-policy/
Submission: On September 06 via api from TR — Scanned from DE
Submission: On September 06 via api from TR — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Products * Attack Surface Management * Vulnerability Intelligence ATTACK SURFACE MANAGEMENT Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans for exposures in your known & unknown assets. SIGN-UP FOR ASM VULNERABILITY INTELLIGENCE Our VI platform delivers threat intelligence & context on the latest cyber threats providing you with actionable insights for remediation. REQUEST A DEMO * Services * Vulnerability Management * Penetration Testing VULNERABILITY MANAGEMENT Our vulnerability management continually detects, prioritizes, & plans remediation to protect your entire IT landscape. PENETRATION TESTING Our penetration testing simulates a real-world attack on your digital assets to determine the strength of your security & defenses. * Use Cases * Attack Surface Management * Continuous Attack Surface Reduction * Discovery of Known & Unknown Assets * Assets with Known Ransomware & Exploitable Vulnerabilities * Non-Production Systems Exposed to the Public * Monitor Subsidiaries & Acquisitions * Vulnerability Intelligence * Early Warning Risk Alerts * Vulnerability Prioritization * Tech Stack Alerting * Actionable Threat Intelligence * Penetration Testing * Network & Infrastructure Penetration Testing * Meet your Compliance Requirements * Test Your Security Resilience * Protect Intellectual Property * Vulnerability Management * Manage Vulnerabilities & Exposures * Network & Application Vulnerability Management * Threat & Vulnerability Advisories * Vulnerability Validation & False Positive Elimination Continuous Attack Surface Reduction Discovery of Known & Unknown Assets Assets with Known Ransomware & Exploitable Vulnerabilities Non-Production Systems Exposed to the Public Monitor Subsidiaries & Acquisitions Manage Vulnerabilities & Exposures Network & Application Vulnerability Management Threat & Vulnerability Advisories Vulnerability Validation & False Positive Elimination Early Warning Risk Alerts Vulnerability Prioritization Tech Stack Alerting Actionable Threat Intelligence Network & Infrastructure Penetration Testing Meet your Compliance Requirements Test Your Security Resilience Protect Intellectual Property * Partners * Partner Program * Become a Partner * Register a Deal PARTNERS As a partner led organization, we are committed to working with our partners to deliver world-class early warning security intelligence solutions that eliminate the adversary advantage & deliver superior security outcomes for your clients. Partner Program Become a Partner Register a Deal * Resources * Reports * Zero Days * Articles * Patch Watch * Webinars & Podcasts * Exclusive Threat Insights * Media Coverage * Glossary RESOURCES Reports Zero Days Articles Patch Watch Webinars & Podcasts Exclusive Threat Insights Media Coverage Glossary * About * Overview * Careers USA WHO WE ARE Overview CAREERS USA OPPORTUNITIES X Get Started! * Products * Attack Surface Management * Vulnerability Intelligence ATTACK SURFACE MANAGEMENT Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans for exposures in your known & unknown assets. SIGN-UP FOR ASM VULNERABILITY INTELLIGENCE Our VI platform delivers threat intelligence & context on the latest cyber threats providing you with actionable insights for remediation. REQUEST A DEMO * Services * Vulnerability Management * Penetration Testing VULNERABILITY MANAGEMENT Our vulnerability management continually detects, prioritizes, & plans remediation to protect your entire IT landscape. PENETRATION TESTING Our penetration testing simulates a real-world attack on your digital assets to determine the strength of your security & defenses. * Use Cases * Attack Surface Management * Continuous Attack Surface Reduction * Discovery of Known & Unknown Assets * Assets with Known Ransomware & Exploitable Vulnerabilities * Non-Production Systems Exposed to the Public * Monitor Subsidiaries & Acquisitions * Vulnerability Intelligence * Early Warning Risk Alerts * Vulnerability Prioritization * Tech Stack Alerting * Actionable Threat Intelligence * Penetration Testing * Network & Infrastructure Penetration Testing * Meet your Compliance Requirements * Test Your Security Resilience * Protect Intellectual Property * Vulnerability Management * Manage Vulnerabilities & Exposures * Network & Application Vulnerability Management * Threat & Vulnerability Advisories * Vulnerability Validation & False Positive Elimination Continuous Attack Surface Reduction Discovery of Known & Unknown Assets Assets with Known Ransomware & Exploitable Vulnerabilities Non-Production Systems Exposed to the Public Monitor Subsidiaries & Acquisitions Manage Vulnerabilities & Exposures Network & Application Vulnerability Management Threat & Vulnerability Advisories Vulnerability Validation & False Positive Elimination Early Warning Risk Alerts Vulnerability Prioritization Tech Stack Alerting Actionable Threat Intelligence Network & Infrastructure Penetration Testing Meet your Compliance Requirements Test Your Security Resilience Protect Intellectual Property * Partners * Partner Program * Become a Partner * Register a Deal PARTNERS As a partner led organization, we are committed to working with our partners to deliver world-class early warning security intelligence solutions that eliminate the adversary advantage & deliver superior security outcomes for your clients. Partner Program Become a Partner Register a Deal * Resources * Reports * Zero Days * Articles * Patch Watch * Webinars & Podcasts * Exclusive Threat Insights * Media Coverage * Glossary RESOURCES Reports Zero Days Articles Patch Watch Webinars & Podcasts Exclusive Threat Insights Media Coverage Glossary * About * Overview * Careers USA WHO WE ARE Overview CAREERS USA OPPORTUNITIES X Get Started! * Products * Attack Surface Management * Vulnerability Intelligence ATTACK SURFACE MANAGEMENT Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans for exposures in your known & unknown assets. SIGN-UP FOR ASM VULNERABILITY INTELLIGENCE Our VI platform delivers threat intelligence & context on the latest cyber threats providing you with actionable insights for remediation. REQUEST A DEMO * Services * Vulnerability Management * Penetration Testing VULNERABILITY MANAGEMENT Our vulnerability management continually detects, prioritizes, & plans remediation to protect your entire IT landscape. PENETRATION TESTING Our penetration testing simulates a real-world attack on your digital assets to determine the strength of your security & defenses. * Use Cases * Attack Surface Management * Continuous Attack Surface Reduction * Discovery of Known & Unknown Assets * Assets with Known Ransomware & Exploitable Vulnerabilities * Non-Production Systems Exposed to the Public * Monitor Subsidiaries & Acquisitions * Vulnerability Intelligence * Early Warning Risk Alerts * Vulnerability Prioritization * Tech Stack Alerting * Actionable Threat Intelligence * Penetration Testing * Network & Infrastructure Penetration Testing * Meet your Compliance Requirements * Test Your Security Resilience * Protect Intellectual Property * Vulnerability Management * Manage Vulnerabilities & Exposures * Network & Application Vulnerability Management * Threat & Vulnerability Advisories * Vulnerability Validation & False Positive Elimination Continuous Attack Surface Reduction Discovery of Known & Unknown Assets Assets with Known Ransomware & Exploitable Vulnerabilities Non-Production Systems Exposed to the Public Monitor Subsidiaries & Acquisitions Manage Vulnerabilities & Exposures Network & Application Vulnerability Management Threat & Vulnerability Advisories Vulnerability Validation & False Positive Elimination Early Warning Risk Alerts Vulnerability Prioritization Tech Stack Alerting Actionable Threat Intelligence Network & Infrastructure Penetration Testing Meet your Compliance Requirements Test Your Security Resilience Protect Intellectual Property * Partners * Partner Program * Become a Partner * Register a Deal PARTNERS As a partner led organization, we are committed to working with our partners to deliver world-class early warning security intelligence solutions that eliminate the adversary advantage & deliver superior security outcomes for your clients. Partner Program Become a Partner Register a Deal * Resources * Reports * Zero Days * Articles * Patch Watch * Webinars & Podcasts * Exclusive Threat Insights * Media Coverage * Glossary RESOURCES Reports Zero Days Articles Patch Watch Webinars & Podcasts Exclusive Threat Insights Media Coverage Glossary * About * Overview * Careers USA WHO WE ARE Overview CAREERS USA OPPORTUNITIES X Get Started! * Products * Attack Surface Management * Vulnerability Intelligence ATTACK SURFACE MANAGEMENT Our ASM platform discovers, analyzes, prioritizes, & offers remediation plans for exposures in your known & unknown assets. SIGN-UP FOR ASM VULNERABILITY INTELLIGENCE Our VI platform delivers threat intelligence & context on the latest cyber threats providing you with actionable insights for remediation. REQUEST A DEMO * Services * Vulnerability Management * Penetration Testing VULNERABILITY MANAGEMENT Our vulnerability management continually detects, prioritizes, & plans remediation to protect your entire IT landscape. PENETRATION TESTING Our penetration testing simulates a real-world attack on your digital assets to determine the strength of your security & defenses. * Use Cases * Attack Surface Management * Continuous Attack Surface Reduction * Discovery of Known & Unknown Assets * Assets with Known Ransomware & Exploitable Vulnerabilities * Non-Production Systems Exposed to the Public * Monitor Subsidiaries & Acquisitions * Vulnerability Intelligence * Early Warning Risk Alerts * Vulnerability Prioritization * Tech Stack Alerting * Actionable Threat Intelligence * Penetration Testing * Network & Infrastructure Penetration Testing * Meet your Compliance Requirements * Test Your Security Resilience * Protect Intellectual Property * Vulnerability Management * Manage Vulnerabilities & Exposures * Network & Application Vulnerability Management * Threat & Vulnerability Advisories * Vulnerability Validation & False Positive Elimination Continuous Attack Surface Reduction Discovery of Known & Unknown Assets Assets with Known Ransomware & Exploitable Vulnerabilities Non-Production Systems Exposed to the Public Monitor Subsidiaries & Acquisitions Manage Vulnerabilities & Exposures Network & Application Vulnerability Management Threat & Vulnerability Advisories Vulnerability Validation & False Positive Elimination Early Warning Risk Alerts Vulnerability Prioritization Tech Stack Alerting Actionable Threat Intelligence Network & Infrastructure Penetration Testing Meet your Compliance Requirements Test Your Security Resilience Protect Intellectual Property * Partners * Partner Program * Become a Partner * Register a Deal PARTNERS As a partner led organization, we are committed to working with our partners to deliver world-class early warning security intelligence solutions that eliminate the adversary advantage & deliver superior security outcomes for your clients. Partner Program Become a Partner Register a Deal * Resources * Reports * Zero Days * Articles * Patch Watch * Webinars & Podcasts * Exclusive Threat Insights * Media Coverage * Glossary RESOURCES Reports Zero Days Articles Patch Watch Webinars & Podcasts Exclusive Threat Insights Media Coverage Glossary * About * Overview * Careers USA WHO WE ARE Overview CAREERS USA OPPORTUNITIES X Get Started! DISCLOSURE POLICY OUR VALUES Securin, Inc. (Securin) as a security service provider and research organization strongly believes that a constructive and coordinated disclosure is the best approach to address and fix a vulnerability. We also believe that these contributions to the security community will be helpful to reduce attack surfaces or vectors against diverse and ever changing threats. SCOPE Securin vulnerability disclosure policy applies to any third party vendor products to whom Securin will assign the CVEs for vulnerabilities, if the product is not a part of another CVE Numbering Authority (CNA) scope. POLICY ONCE A SECURITY ISSUE IS FOUND THE FOLLOWING STEPS WILL BE TAKEN BY SECURIN TO NOTIFY THE RESPECTIVE PARTIES TO FIX IT. * Once we have confirmed the vulnerability, we will gather all the necessary information to communicate the details to the affected party. * Securin will try to establish initial contact with the affected vendor via email regarding the vulnerability with all the supporting documents. * If we don’t receive a response from the vendor within seven days of sending the mail, another reminder will be sent. If the vendor did not respond or refuses to acknowledge the vulnerability within 14 days from initial contact, Securin will publicly disclose the vulnerability. * If we receive a response from the vendor, we will notify them about the date of the vulnerability disclosure that we have set. * The vendor will be allowed 90 days to provide a patch or relevant fix for the issue. If provided, then the vulnerability will be disclosed immediately following the vendor’s patch or fix release. * If a fix is not provided within the 90 day period and no response is received from the vendor, then we will go ahead and disclose the vulnerability on the afford-mentioned date. * In the event that the vendor is unable to provide a fix within the deadline, but has communicated Securin regarding the same, then the deadline could be adjusted. A maximum of six months of coordination will be given to the vendor for fixing the vulnerabilities. After that the vendor will be informed and the vulnerability will be disclosed regardless of the fix. * The 90-day deadline mentioned above is not a hard deadline. Securin can shorten or lengthen the deadline based on certain criteria like the severity of the vulnerability, ease of exploitation, etc. * Until the completion of the disclosure process, Securin will maintain confidentiality of any communication to and from the vendor. However, we will disclose the vulnerability to the public irrespective of the vendor’s support or not. * All the CVEs assigned by Securin and its vulnerability disclosures can be found in the Securin Zero Days List. Only the advisories present in the security advisory will be considered as official documents. Securin is always open to feedback and suggestions. If you would like to contact us, please feel free to email at disclose@securin.io Securin helps leaders continuously improve their security posture. We work as an extension of your team to better protect your organization. * Privacy Policy | Customer Agreements CONTACT * 2440 Louisiana Blvd NE #560, Albuquerque, NM 87110 * 505-302-1113 * info@securin.io SECURITY SOLUTIONS * Attack Surface Management * Vulnerability Intelligence * Vulnerability Management * Penetration Testing RESOURCE CENTER * Ransomware Old * Zero Days * Articles * Patch Watch * * * * * © Copyright 2023 Securin All Rights Reserved 11497