BETA Launching April 2026 — 25% off for early access! Request Demo

Blog

Practical guides on vulnerability management, compliance, and cybersecurity for European organizations.

Latest article

Why We Stopped Trusting a Single Vulnerability Database

SentriKat now fetches CVSS scores from 3 independent sources with automatic fallback. Here's why we built multi-source vulnerability intelligence and what the NVD backlog crisis means for your security posture.

Denis Sota · · 5 min read
NVD CVSS ENISA EUVD
ENISA EUVD European Union NIS2

What Is the ENISA European Vulnerability Database (EUVD)? A Practical Guide

ENISA EUVD is the European Union's vulnerability database mandated by NIS2 Article 12. Learn what it contains, how it compares to NVD and CISA KEV, and how SentriKat integrates it for EU vulnerability management.

Denis Sota · · 5 min read
comparison Tenable Qualys

SentriKat vs Tenable vs Qualys vs Rapid7: Which Vulnerability Scanner Is Right for You?

A detailed comparison of SentriKat with Tenable Nessus, Qualys VMDR, and Rapid7 InsightVM. Learn how a CISA KEV-focused approach differs from traditional full-spectrum vulnerability scanning.

Denis Sota · · 5 min read
CISA KEV vulnerability management compliance

What Is the CISA KEV Catalog and Why Your Business Should Track It

The CISA Known Exploited Vulnerabilities catalog lists CVEs actively used in cyberattacks. Learn what KEV is, how it differs from the NVD, and why tracking it is essential for NIS2 and DORA compliance.

Denis Sota · · 5 min read
air-gapped on-premises security

Vulnerability Management in Air-Gapped Environments: A Practical Guide

How to manage vulnerabilities in air-gapped and isolated networks. Learn about offline KEV tracking, manual knowledge base sync, and SentriKat's approach to vulnerability management without internet access.

Denis Sota · · 5 min read
EPSS CVSS vulnerability prioritization

EPSS vs CVSS: How to Actually Prioritize Vulnerabilities in 2026

CVSS scores alone don't tell you what to fix first. Learn how EPSS (Exploit Prediction Scoring System) and the CISA KEV catalog provide real-world exploit context for better vulnerability prioritization.

Denis Sota · · 5 min read
MSP multi-tenant vulnerability management

Vulnerability Management for MSPs: How to Scale Across Multiple Clients

How managed service providers can deliver vulnerability management at scale using multi-tenant architecture, white-label branding, and CISA KEV-focused prioritization. A practical guide for MSPs.

Denis Sota · · 5 min read
DORA financial services compliance

DORA Vulnerability Management for Financial Services: A Practical Guide

The Digital Operational Resilience Act requires ICT vulnerability management for financial entities. Learn DORA requirements, deadlines, and how to implement compliant vulnerability tracking.

Denis Sota · · 4 min read
on-premises data sovereignty GDPR

On-Premises vs Cloud Vulnerability Management: Why Data Sovereignty Matters

Should your vulnerability management tool be self-hosted or cloud-based? We compare on-premises and SaaS approaches for organizations that care about data sovereignty and GDPR compliance.

Denis Sota · · 5 min read
NIS2 PMI gestione vulnerabilità

Gestione delle Vulnerabilità per PMI: Guida Pratica alla Conformità NIS2

La direttiva NIS2 richiede la gestione delle vulnerabilità per le PMI europee. Scopri cosa serve, come implementarla senza budget enterprise, e come SentriKat automatizza la conformità.

Denis Sota · · 4 min read
NIS2 compliance vulnerability management

NIS2 Vulnerability Management: What European SMBs Need to Know in 2026

NIS2 requires vulnerability handling for essential and important entities across the EU. Learn what Article 21 demands, how to demonstrate compliance, and practical tools for SMBs.

Denis Sota · · 5 min read