Authored by: PlexTrac Team Posted on: January 11, 2024 Simplify Pentest Reporting and Improve Time to Value With the Industry’s Largest Findings Repository You can now leverage writeups for over 25,000 CWEs, CVEs, and KEVs to provide detailed guidance on vulnerabilities, the level of exposure, and remediation steps At PlexTrac, it’s our mission to help cut pentest reporting time while ensuring high-quality, actionable reports. In line with this mission, we have added to our already extensive library of writeups to now include Common Vulnerabilities and Exposures (CVEs), Common Weakness Enumerations (CWEs), and Known Exploited Vulnerabilities (KEVs) to help customers enrich findings with guidance on vulnerabilities or flaws, the level of exposure, and remediation steps. We now offer over 25,000 writeups – more than any other pentest reporting automation platform. What are CVEs, CWEs, and KEVs and why is it important to include the findings writeups in the platform? As you know, CVEs are used to identify a specific vulnerability, CWEs are used to categorize flaws or weaknesses that could potentially result in a vulnerability, and KEVs reference vulnerabilities that have already been exploited as documented by CISA. Searching for or manually creating a CWE, CVE, and KEV writeup is tedious and error prone. Incomplete writeups can result in missed remediation steps or, worse, threat recurrence. By having CVE, CWE, and KEV writeups in the PlexTrac platform, customers can insert the appropriate explanation of the flaw or vulnerability as well as the proposed fix, which speeds the delivery of the report. It helps provide developers with the context needed to strategically remediate flaws promptly and enables service providers to enhance their unique value proposition by advising prescriptively on which findings to fix first. What other value adds are in the works for the PlexTrac platform? A few months ago, we released our new style and configuration features, designed to further streamline the reporting workflow and enable scalable delivery of customized pentest reports without the need for a highly technical resource or a substantial time investment. As part of the release, we added: Additional and expanded pre-built export report templates Style guides with customizable options Configurable findings layouts (add, remove, or reorganize sections at your discretion) Since the release, we have been diligently working to add even more low-code options for the reports, including more report templates. We’ve also been working on ways to help you track and prioritize groups of thematic findings. Imagine being able to not only share the proposed fixes but also the order of priority based on a fully customizable, contextual severity score. Ready to learn more? Aside from offering the largest findings repository in the industry, there are several other areas where we stand out amongst the competition. Check out our recipe for selecting a pentest management and automation platform that meets your unique needs. PlexTrac Team Editoral Group At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.
Vulnerability Management in the Age of AI: From Data Overload to Decisive Action By Sean Martin and Marco Ciappelli, Co-Founders of ITSPmagazine Between the 300-page pentest PDF and the spreadsheet no one is updating, security teams lose the thread. Findings pile up, priorities blur, and the key question — are we actually getting safer? — goes unanswered. That is the problem Daniel DeCloss set out to solve when... READ ARTICLE
RSA Takeaways on AI, Exposure Management, and Execution As I’m heading back from RSA, I’ve had a little time to decompress and think about what stood out most from the week. Like every RSA, it was full. Booth conversations, customer meetings, partner catchups, walking too much, talking too much, and trying to make sense of where this market is actually headed underneath all... READ ARTICLE
The AI Arms Race – Why Unified Exposure Management is becoming a Boardroom Priority Over the past year, I’ve noticed a shift in the conversations I’m having with security leaders. It’s no longer just about more vulnerabilities or more tools but speed and how difficult it’s becoming to keep up. The cybersecurity landscape is accelerating at an unprecedented rate. We are witnessing the dawn of a new era in... READ ARTICLE