Answers to your questions

Quickly find answers to your questions about cybersecurity, CVE Find, standards, vulnerabilities and Bexxo services in our comprehensive FAQ.

FAQ

What are the essential cybersecurity standards?

Key standards include ISO 27001, NIST, nLPD, GDPR, and PCI-DSS. They provide robust frameworks for securing your systems and ensuring data protection.

What are the major cybersecurity challenges for businesses?

The main challenges include the protection of sensitive data, regulatory compliance (GDPR, ISO 27001, etc.), attack prevention, and crisis management. Bexxo helps you prioritize these issues and address them effectively.

What are the risks associated with a lack of awareness?

A lack of awareness exposes the company to very real risks: opening fraudulent emails, installing malware, data leaks, or even bad practices such as using unencrypted media or sharing passwords. These errors can lead to costly cyberattacks or even business interruptions.

In addition, untrained personnel can become the unintentional entry point for ransomware, data theft, or industrial espionage. In a context of increasing digitization, ignoring this aspect amounts to leaving a permanent flaw in the company's defense.

What benefits do companies gain from a network audit?

Optimized performance, reduced vulnerabilities, and service continuity. You'll have a network that is both reliable and scalable.

What deliverables can I expect from a cybersecurity consultation?

You will receive a detailed action plan with customized recommendations and an implementation timeline. Bexxo also provides follow-up to measure progress and adjust the strategy as needed.

What does EPSS stand for?

EPSS stands for Exploit Prediction Scoring System. It is a probabilistic model that assigns each vulnerability (typically identified by a CVE identifier) a probability of being exploited within 30 days of its observation.

The goal of EPSS is to complement other scoring systems (like CVSS) by adding a dynamic and contextual layer based on real-world exploitation data observed in the wild. This allows organizations to better prioritize their remediation efforts based on the actual risk of exploitation.

What is CISA in cybersecurity?

CISA (Cybersecurity and Infrastructure Security Agency) is a U.S. government agency. It is responsible for protecting the United States' critical infrastructure from cyber and physical threats by providing support, tools, and recommendations to government agencies, businesses, and the public.

In the field of cybersecurity, CISA acts as a coordination center to prevent cyberattacks, respond to incidents, share threat information, and promote security best practices. Although American, its role and resources influence cybersecurity practices globally due to its transparency and leadership.

What is a CVE?

A CVE (Common Vulnerabilities and Exposures) is a unique identifier assigned to a known vulnerability in a computer system, software, or hardware. It allows for the precise naming and tracking of a flaw, even when it is addressed by different vendors, tools, or databases. Each CVE follows the format CVE-year-number, such as CVE-2023-12345.

The purpose of CVEs is to standardize communication about security flaws: instead of using variable descriptions, all actors can refer to the same identifier. This facilitates coordination between researchers, software publishers, security teams, and security solution providers.

  • Tags:  
  • CVE
What is a CWE?

A CWE (Common Weakness Enumeration) is a standardized classification of weaknesses that can lead to vulnerabilities in software, firmware, or systems. Unlike CVEs, which designate specific and documented vulnerabilities in a given product, CWEs describe types of design or programming flaws that can affect the security of a system.

For example, a CWE might describe improper memory management, command injection, or insufficient input validation. These weaknesses can then be detected in multiple software programs and associated with individual CVEs if they are exploited in a real-world context.

  • Tags:  
  • CWE
What is a network audit?

It is a diagnostic assessment of the architecture and configurations of your infrastructure (routers, firewalls, switches, etc.) to identify potential security vulnerabilities or bottlenecks.

What is a penetration test (pentest)?

A penetration test, or pentest, is a security assessment that involves simulating a real attack on a computer system, network, or application in order to identify exploitable vulnerabilities. The goal is to detect weaknesses before an attacker discovers them, and to provide concrete recommendations to strengthen security.

Unlike purely documentary audits, a pentest relies on offensive techniques similar to those used by hackers. It may include exploiting software flaws, compromising accounts, or traversing firewalls. It is often performed in addition to an automated scan to assess not only the presence of vulnerabilities, but also their actual exploitability in the target context.

What is a web cybersecurity audit?

A web audit involves an in-depth analysis of the vulnerabilities of a website or online application: penetration testing, source code review, server configurations, etc.

What is a zero-day vulnerability?

A zero-day vulnerability is a security flaw unknown to the manufacturer or publisher of a software, hardware, or system. It is called "zero-day" because the publisher has had zero days to fix the vulnerability at the time it is discovered or exploited. Therefore, it has not yet been the subject of an official patch or public reporting.

These flaws can exist for months, or even years, without being detected. When they are found by cybercriminals or state-sponsored groups, they can be exploited discreetly, making their potential impact very serious.

What is the company's responsibility in the event of an incident caused by a poorly informed employee?

If a security incident occurs due to risky behavior by a poorly informed employee, the company remains largely responsible. The law, including the nLPD in Switzerland and the GDPR in Europe, requires organizations to take the necessary measures to protect data and reduce risks. This includes training and awareness for staff.

In the event of a dispute or investigation, a company unable to demonstrate that it has implemented preventive actions (such as regular training, awareness campaigns, or reminders of best practices) could be deemed negligent. This can lead to fines, damage to reputation, and a loss of trust from customers and partners.

What is the difference between CAPEC and CWE?

CAPEC and CWE are two complementary databases maintained by MITRE, but they do not have the same objective. CWE describes technical weaknesses in code or design (e.g., lack of input validation), while CAPEC describes attack methods that exploit these weaknesses (e.g., SQL injection).

In other words, CWE focuses on the cause, while CAPEC focuses on the attacker's action. The two can be linked: a CAPEC pattern often specifies which CWEs it targets, making it possible to link the theoretical vulnerability, the practical exploitation, and the associated CVEs.