SAMMY works best on screens 1024px wide or larger.
Threat Intelligence
RV.1.1: Gather information from software acquirers, users, and public sources on potential vulnerabilities in the software and third-party components that the software uses, and investigate all credible reports.
  • Example 1: Monitor vulnerability databases, security mailing lists, and other sources of vulnerability reports through manual or automated means.
  • Example 2: Use threat intelligence sources to better understand how vulnerabilities in general are being exploited.
  • Example 3: Automatically review provenance and software composition data for all software components to identify any new vulnerabilities they have.
CMMI Maturity
Description

Gather information from software acquirers, users, and public sources on potential vulnerabilities in the software and third-party components that the software uses, and investigate all credible reports.