-
Notifications
You must be signed in to change notification settings - Fork 36
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #3197 from CVEProject/tat-3180-logo
Resolves #3180 logo
- Loading branch information
Showing
8 changed files
with
153 additions
and
14 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,108 @@ | ||
{ | ||
"currentNews": [ | ||
{ | ||
"id": 429, | ||
"newsType": "blog", | ||
"title": "CVE Program Celebrates 25 Years of Impact!", | ||
"urlKeywords": "CVE Program Celebrates 25 Years", | ||
"date": "2024-10-22", | ||
"author": { | ||
"name": "CVE Program", | ||
"organization": { | ||
"name": "CVE Program", | ||
"url": "" | ||
}, | ||
"title": "", | ||
"bio": "" | ||
}, | ||
"description": [ | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "Today, the <a href='/'>Common Vulnerabilities and Exposures (CVE®) Program</a> proudly commemorates its <a href='/Resources/Media/Cve25YearsAnniversaryReport.pdf' target='_blank'>25th anniversary</a>, marking a quarter-century of enabling coordinated vulnerability management through global collaboration and innovation. Launched in 1999, the CVE Program has transformed the way organizations identify and manage cybersecurity vulnerabilities, enabling stronger defenses against cyber threats. The <i><a href='/Resources/Media/Cve25YearsAnniversaryReport.pdf' target='_blank'>CVE 25th Anniversary Report</a></i> is available now on the CVE.ORG website." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "<a href='https://www.mitre.org/' target='_blank'>MITRE</a> presented the <a href='/Resources/General/Towards-a-Common-Enumeration-of-Vulnerabilities.pdf' target='_blank'>original vision for the CVE List</a> in a groundbreaking white paper during the 2nd Workshop on Research with Security Vulnerability Databases. Since then, the CVE Program has evolved into a vital resource for cybersecurity professionals and serves as the backbone for the global vulnerability management ecosystem. The program has seen widespread adoption, with over 400 <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> from 40 countries now producing <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> which are incorporated countless products and security advisories. From the initial 321 CVE Records in 1999, to over 240,000 in October 2024, CVE serves as a cornerstone for effective vulnerability management worldwide across national vulnerability databases, cybersecurity tool vendors, incident response operations, researchers, and policymakers." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "“As we reflect on this historic milestone, we recognize the collective efforts of hundreds of organizations and thousands of individuals across our diverse partner community that contributed to making the CVE Program a success,” said Kent Landfield and Lisa Olson speaking on behalf of the <a href='/ProgramOrganization/Board'>CVE Board</a>." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "“CISA is proud to sponsor the CVE Program. We are committed to working with the CVE Program’s community of international stakeholders to reduce cybersecurity risk by addressing the prevalence and impact of vulnerabilities across enterprises and technologies,” said Sandra Radesky, <a href='https://www.cisa.gov/' target='_blank'>CISA</a> Associate Director of Vulnerability Management." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "“The success of the CVE Program is a testament to the power of federation; its collaborative approach brings together experts in industry, government, and academia across the globe to create a common and scalable vulnerability identification standard that provides a foundation for vulnerability management worldwide,” said <a href='https://www.mitre.org/who-we-are/our-people/yosry-barsoum' target='_blank'>Yosry Barsoum</a>, Vice President of the Center for Securing the Homeland at MITRE." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "Looking ahead, the CVE Program is committed to expanding its reach and impact. Its priorities include continuing to increase program adoption and coverage through growing the CNA community in less represented industry sectors, strengthening the connection between the program and its downstream consumers, and further <a href='/Media/News/item/blog/2024/09/10/CNA-Enrichment-Recognition-List'>increasing the value and quality of CVE Records through data enrichment</a>." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "As we reflect on 25 years of achievements, we encourage all cybersecurity professionals, researchers, and partners to engage with the CVE Program and contribute to its ongoing development. Together, we can continue to strengthen the global cybersecurity landscape and address the evolving challenges of our digital world." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "View the <i>CVE 25th Anniversary Report</i> <a href='/Resources/Media/Cve25YearsAnniversaryReport.pdf' target='_blank'>here</a>." | ||
} | ||
] | ||
}, | ||
{ | ||
"id": 428, | ||
"displayOnHomepageOrder": 0, | ||
"newsType": "press-release", | ||
"title": "CVE Program Celebrates 25 Years of Impact in Cybersecurity: Strengthening Global Collaboration and Vulnerability Management", | ||
"date": "2024-10-22", | ||
"description": [ | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "FOR IMMEDIATE RELEASE — Today, the Common Vulnerabilities and Exposures (<a href='/'>CVE</a>®) Program proudly commemorates its 25th anniversary, marking a quarter-century of enabling coordinated vulnerability management through global collaboration and innovation. Launched in 1999, the CVE Program has transformed the way organizations identify and manage cybersecurity vulnerabilities, enabling stronger defenses against cyber threats. The <a href='/Resources/Media/Cve25YearsAnniversaryReport.pdf' target='_blank'>CVE 25th Anniversary Report</a> is available now on cve.org." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "<a href='https://www.mitre.org/' target='_blank'>MITRE</a> presented the original vision for the CVE List in a groundbreaking white paper during the 2nd Workshop on Research with Security Vulnerability Databases. Since then, the CVE Program has evolved into a vital resource for cybersecurity professionals and serves as the backbone for the global vulnerability management ecosystem. The program has seen widespread adoption, with over 400 CVE Numbering Authorities (CNAs) from 40 countries now producing CVE Records which are incorporated countless products and security advisories. From the initial 321 CVE Records in 1999, to over 240,000 in October 2024, CVE serves as a cornerstone for effective vulnerability management worldwide across national vulnerability databases, cybersecurity tool vendors, incident response operations, researchers, and policymakers." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "“As we reflect on this historic milestone, we recognize the collective efforts of hundreds of organizations and thousands of individuals across our diverse partner community that contributed to making the CVE Program a success,” said Kent Landfield and Lisa Olson speaking on behalf of the <a href='/ProgramOrganization/Board'>CVE Board</a>." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "“CISA is proud to sponsor the CVE Program. We are committed to working with the CVE Program’s community of international stakeholders to reduce cybersecurity risk by addressing the prevalence and impact of vulnerabilities across enterprises and technologies,” said Sandra Radesky, <a href='https://www.cisa.gov/' target='_blank'>CISA</a> Associate Director of Vulnerability Management." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "“The success of the CVE Program is a testament to the power of federation; its collaborative approach brings together experts in industry, government, and academia across the globe to create a common and scalable vulnerability identification standard that provides a foundation for vulnerability management worldwide,” said <a href='https://www.mitre.org/who-we-are/our-people/yosry-barsoum' target='_blank'>Yosry Barsoum</a>, Vice President of the Center for Securing the Homeland at MITRE." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "Looking ahead, the CVE Program is committed to expanding its reach and impact. Its priorities include continuing to increase program adoption and coverage through growing the CNA community in less represented industry sectors, strengthening the connection between the program and its downstream consumers, and further increasing the value and quality of CVE Records through data enrichment." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "As we reflect on 25 years of achievements, we encourage all cybersecurity professionals, researchers, and partners to engage with the CVE Program and contribute to its ongoing development. Together, we can continue to strengthen the global cybersecurity landscape and address the evolving challenges of our digital world." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "For more information about the CVE Program and how you can get involved, visit <a href='/'>https://www.cve.org</a>." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "<strong>About the CVE Program</strong><br/>The mission of the <a href='/'>CVE® Program</a> is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. It is used by organizations worldwide to enhance their cybersecurity practices and improve their vulnerability management processes." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "CVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and managed by the Homeland Security Systems Engineering and Development Institute (HSSEDI), which is operated by The MITRE Corporation (MITRE)." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "MEDIA CONTACT<br/>Sarah Lytle, <a href='mailto:[email protected]'>[email protected]</a>" | ||
} | ||
] | ||
}, | ||
{ | ||
"id": 421, | ||
"newsType": "news", | ||
|
@@ -70,7 +173,6 @@ | |
}, | ||
{ | ||
"id": 418, | ||
"displayOnHomepageOrder": 0, | ||
"newsType": "news", | ||
"title": "Minutes from CVE Board Teleconference Meeting on September 18 Now Available", | ||
"urlKeywords": "CVE Board Minutes from September 18", | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters