trackd_logo_dark-1

The trackd blog

News, stories and insights from the team at trackd

trackd's new vulnerability remediation solution is fundamentally different.

A Lot Different vs. a Little Better

Mike, our founder and CEO, took care of that differentiation thing on day one, pitch-deck slide one, prototype one. Nobody’s doing what we’re doing, and to quote an enthusiastic visitor to our booth at last

The FutureCon Show in Chicago was trackd's first ever.

Observations From Our First Show (FutureCon)

There’s a new IT generation emerging in the manufacturing world. We had a few conversations with young IT professionals eagerly anticipating the imminent retirement of legacy IT leadership that lived in a world where IT

Vulnerability Prioritization

What is Vulnerability Prioritization?

Vulnerability prioritization is the practice of deciding which of the many unpatched vulnerabilities on the typical corporate network should be addressed first because they pose the most cyber risk to the organization. Vulnerability prioritization is

Collective defense in cybersecurity means information sharing to battle the bad guys as a group.

Collective Defense and Patch Management

Collective defense in cybersecurity has been synonymous with threat intelligence sharing for a long time, but a new technology is bringing that concept to the world of patch management.

trackd is re-imagining vulnerability remediation

Google Reviews and Vulnerability Remediation

The internet has enabled us to live in a world where we can all leverage our collective experience to improve our individual decision-making. Just moved to town and need a new dentist? Check candidates out

Identifying vulnerabilities is the first step in the vulnerability management process.

Identify Vulnerabilities

How Do You Identify Vulnerabilities? There are many tools on the market, and even some that are free of charge, that will enable your security or IT team to identify vulnerabilities. Tenable, Qualys, and Rapid

trackd vs. ChatGPT

So even with the knowledge that 98 out of 100 patches are safe to deploy, remediation teams are unlikely to modify their processes to patch more aggressively any more than the average person would change their decision to play Russian Roulette with a gun with 100 chambers and only 2 live bullets.

Server patching is a critical part of enterprise cyber security

Server Patching

The primary new technology for server patching uses crowdsourced data on patches that have been applied to help guide remediation teams and highlight patches that have a history of disruption, and perhaps more valuably, those that have a history of safe deployment.

A cute puppy and vulnerability management - unlikely combination

If it Ain’t Breaking Stuff, Fix It

Tell us when patches are disruptive? Sure. But more importantly, let us know when they’re not, information that’s potentially much more actionable.

Being a closer in baseball and an IT professional are both thankless jobs.

The Closer and the IT Pro

As an IT or cybersecurity pro, much like a closer in baseball, you’re only the star of the movie when you fail, and when you succeed, it’s expected, and let’s face it, unappreciated. Day-in and day-out, that ain’t easy.

trackd's new vulnerability remediation solution is fundamentally different.

A Lot Different vs. a Little Better

Mike, our founder and CEO, took care of that differentiation thing on day one, pitch-deck slide one, prototype one. Nobody’s doing what we’re doing, and to quote an enthusiastic visitor to our booth at last week’s FutureCon show outside DC, “I can’t believe no one’s thought of this…”

trackd is bringing crowdsourcing and collective defense to vulnerability remediation and patch management

trackd Secures $3.35MM Seed Funding to Bring Its Novel Approach to Vulnerability Remediation to the Enterprise Security Market

“Innovation in vulnerability management has been scarce over the past decade, and trackd is blowing up that narrative with a solution that we believe can have a material impact on remediation timeframes,” noted Geoff Gilton SVP, Technology at Service Credit Union, an early adopter and design partner. “We’re excited to be part of the process to bring this technology to the infosec community.”

The FutureCon Show in Chicago was trackd's first ever.

Observations From Our First Show (FutureCon)

There’s a new IT generation emerging in the manufacturing world. We had a few conversations with young IT professionals eagerly anticipating the imminent retirement of legacy IT leadership that lived in a world where IT and security were necessary evils, chronically underfunded, and an afterthought.

Patch Management - like dating - can be greatly improved by sharing information.

Cheating Guys and Patch Management (Yup, you read that right.)

Whether we’re talking about sharing indicators of compromise (IoCs) in the cyber security community, Google Reviews of a new restaurant, exposing the bad behavior of potential dating partners, or identifying – before they’re applied – security patches that are most likely to cause disruption, shared information is powerful.

Vulnerability Prioritization

What is Vulnerability Prioritization?

Vulnerability prioritization is the practice of deciding which of the many unpatched vulnerabilities on the typical corporate network should be addressed first because they pose the most cyber risk to the organization. Vulnerability prioritization is