Security posture update — HttpOnly sessions, nonce-based CSP, SBOM pipeline
A transparent write-up of the April 2026 security hardening on sentrikat.com and portal.sentrikat.com: what we changed, why it matters, and what's next.
Practical guides on vulnerability management, compliance, and cybersecurity for European organizations.
A transparent write-up of the April 2026 security hardening on sentrikat.com and portal.sentrikat.com: what we changed, why it matters, and what's next.
Sprint 4 and Sprint 5 add CRA-ready SBOM export (CycloneDX, SPDX, STIX), signed gap-analysis reports for PCI-DSS, ISO 27001 and SOC 2, full remediation assignments with SLA tracking, and multi-tracker integration with Jira, GitHub, GitLab and YouTrack.
We're opening SentriKat to 30 SaaS and 15 on-premises organizations for free. Full Pro features, no credit card, no time limit. Here's what you get and how to join.
SentriKat now fetches CVSS scores from 3 independent sources with automatic fallback. Here's why we built multi-source vulnerability intelligence and what the NVD backlog crisis means for your security posture.
ENISA EUVD is the European Union's vulnerability database mandated by NIS2 Article 12. Learn what it contains, how it compares to NVD and CISA KEV, and how SentriKat integrates it for EU vulnerability management.
A detailed comparison of SentriKat with Tenable Nessus, Qualys VMDR, and Rapid7 InsightVM. Learn how a CISA KEV-focused approach differs from traditional full-spectrum vulnerability scanning.
The CISA Known Exploited Vulnerabilities catalog lists CVEs actively used in cyberattacks. Learn what KEV is, how it differs from the NVD, and why tracking it is essential for NIS2 and DORA compliance.
How to manage vulnerabilities in air-gapped and isolated networks. Learn about offline KEV tracking, manual knowledge base sync, and SentriKat's approach to vulnerability management without internet access.
CVSS scores alone don't tell you what to fix first. Learn how EPSS (Exploit Prediction Scoring System) and the CISA KEV catalog provide real-world exploit context for better vulnerability prioritization.
How managed service providers can deliver vulnerability management at scale using multi-tenant architecture, white-label branding, and CISA KEV-focused prioritization. A practical guide for MSPs.
The Digital Operational Resilience Act requires ICT vulnerability management for financial entities. Learn DORA requirements, deadlines, and how to implement compliant vulnerability tracking.
Should your vulnerability management tool be self-hosted or cloud-based? We compare on-premises and SaaS approaches for organizations that care about data sovereignty and GDPR compliance.
This post is in Italian.
La direttiva NIS2 richiede la gestione delle vulnerabilità per le PMI europee. Scopri cosa serve, come implementarla senza budget enterprise, e come SentriKat automatizza la conformità.
NIS2 requires vulnerability handling for essential and important entities across the EU. Learn what Article 21 demands, how to demonstrate compliance, and practical tools for SMBs.