-
Notifications
You must be signed in to change notification settings - Fork 38
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
5 changed files
with
117 additions
and
24 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,88 @@ | ||
{ | ||
"currentNews": [ | ||
{ | ||
"id": 466, | ||
"newsType": "blog", | ||
"title": "CVE Program Expands Partnership with Thales Group", | ||
"urlKeywords": "CVE Program Expands Partnership with Thales Group", | ||
"date": "2025-01-07", | ||
"author": { | ||
"name": "CVE Program", | ||
"organization": { | ||
"name": "CVE Program", | ||
"url": "" | ||
}, | ||
"title": "", | ||
"bio": "" | ||
}, | ||
"description": [ | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "The <a href='/'>CVE® Program</a> is expanding its partnership with <a href='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group</a> for managing the assignment of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publication of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for the CVE Program." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "Thales Group is now designated as a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRoot'>Root</a> for products and technologies of subsidiaries of Thales Group." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "As a Root, Thales Group is responsible for ensuring the effective assignment of CVE IDs, implementing the CVE Program rules and guidelines, and managing the <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> under its care. It is also responsible for recruitment and onboarding of new CNAs and resolving disputes within its scope." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "A <a href='/ProgramOrganization/CNAs'>CNA</a> is an organization responsible for the regular assignment of CVE IDs to vulnerabilities, and for creating and publishing information about the vulnerability in the associated CVE Record. Each CNA has a specific scope of responsibility for vulnerability identification and publishing. There are currently <a href='/PartnerInformation/ListofPartners'>435 CNAs</a> (433 CNAs and 2 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation actively participating in the CVE Program." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "Currently, <a href='/PartnerInformation/ListofPartners/partner/Google'>Google</a>, <a href='/PartnerInformation/ListofPartners/partner/jpcert'>JPCERT/CC</a>, <a href='/PartnerInformation/ListofPartners/partner/redhat'>Red Hat</a>, <a href='/PartnerInformation/ListofPartners/partner/INCIBE'>Spanish National Cybersecurity Institute (INCIBE)</a>, and <a href='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group</a> are Roots under the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>. The <a href='/PartnerInformation/ListofPartners/partner/icscert'>CISA ICS Root</a> is a Root under the <a href='/PartnerInformation/ListofPartners/partner/CISA'>CISA Top-Level Root</a>. Learn more about how the CVE Program is organized on the <a href='/ProgramOrganization/Structure'>Structure page</a>." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "<h4>Comments or Questions?</h4>" | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "If you have any questions about this article, please comment on the <a href='https://medium.com/@cve_program' target='_blank'>CVE Blog on Medium</a>, or use the <a href='https://cveform.mitre.org/' target='_blank'>CVE Program Request forms</a> and select “Other” from the dropdown menu. We look forward to hearing from you!" | ||
} | ||
] | ||
}, | ||
{ | ||
"id": 465, | ||
"displayOnHomepageOrder": 0, | ||
"newsType": "press-release", | ||
"title": "CVE Program Expands Partnership with Thales Group - Thales Group takes new role in assigning and monitoring CVE IDs", | ||
"date": "2025-01-07", | ||
"description": [ | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "FOR IMMEDIATE RELEASE — The <a href='/'>CVE® Program</a> is expanding its partnership with <a href='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group</a> for managing the assignment of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publication of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for the CVE Program." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "Thales Group is now designated as a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRoot'>Root</a> for products and technologies of subsidiaries of Thales Group." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "As a Root, Thales Group is responsible for ensuring the effective assignment of CVE IDs, implementing the CVE Program rules and guidelines, and managing the <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> under its care. It is also responsible for recruitment and onboarding of new CNAs and resolving disputes within its scope." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "A <a href='/ProgramOrganization/CNAs'>CNA</a> is an organization responsible for the regular assignment of CVE IDs to vulnerabilities, and for creating and publishing information about the vulnerability in the associated CVE Record. Each CNA has a specific scope of responsibility for vulnerability identification and publishing. There are currently <a href='/PartnerInformation/ListofPartners'>435 CNAs</a> (433 CNAs and 2 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation actively participating in the CVE Program." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "Currently, <a href='/PartnerInformation/ListofPartners/partner/Google'>Google</a>, <a href='/PartnerInformation/ListofPartners/partner/jpcert'>JPCERT/CC</a>, <a href='/PartnerInformation/ListofPartners/partner/redhat'>Red Hat</a>, <a href='/PartnerInformation/ListofPartners/partner/INCIBE'>Spanish National Cybersecurity Institute (INCIBE)</a>, and <a href='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group</a> are Roots under the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>. <a href='/PartnerInformation/ListofPartners/partner/icscert'>CISA ICS Root</a> is a Root under the <a href='/PartnerInformation/ListofPartners/partner/CISA'>CISA Top-Level Root</a>. Learn more about how the CVE Program is organized on the <a href='/ProgramOrganization/Structure'>Structure page on the CVE website</a>." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "<strong>About the CVE Program</strong><br/>The mission of the <a href='/'>CVE® Program</a> is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There is one CVE Record for each vulnerability in the catalog. The vulnerabilities are discovered then assigned and published by organizations from around the world that have partnered with the CVE Program. Partners publish CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to ensure they are discussing the same issue, and to coordinate their efforts to prioritize and address the vulnerabilities." | ||
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "MEDIA CONTACT<br/><a href='mailto:[email protected]'>[email protected]</a>" | ||
} | ||
] | ||
}, | ||
{ | ||
"id": 464, | ||
"newsType": "blog", | ||
|
@@ -178,7 +261,7 @@ | |
}, | ||
{ | ||
"contentnewsType": "paragraph", | ||
"content": "S21sec’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>." | ||
"content": "S21sec’s Root is the <a href='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group</a>." | ||
} | ||
] | ||
}, | ||
|
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters