Colleagues,

The CVE Program<https://www.cve.org/> is pleased to announce that we are 
expanding our partnership with 
CERT@VDE<https://www.cve.org/PartnerInformation/ListofPartners/partner/CERTVDE>,
 which is now designated as a 
Root<https://www.cve.org/ResourcesSupport/Glossary?activeTerm=glossaryRoot> for 
organizations that are cooperative partners of CERT@VDE.

As a Root, CERT@VDE is now responsible for ensuring the effective assignment of 
CVE IDs, implementing the CVE Program rules and guidelines, and managing the 
CNAs<https://www.cve.org/ProgramOrganization/CNAs> within its purview. It is 
also responsible for recruitment and onboarding of new CNAs and resolving 
disputes within its scope.

Currently, 
CERT@VDE<https://www.cve.org/PartnerInformation/ListofPartners/partner/CERTVDE> 
and CISA 
ICS<https://www.cve.org/PartnerInformation/ListofPartners/partner/icscert> are 
Roots under the CISA Top-Level 
Root<https://www.cve.org/PartnerInformation/ListofPartners/partner/CISA>. 
Google<https://www.cve.org/PartnerInformation/ListofPartners/partner/Google>, 
JPCERT/CC<https://www.cve.org/PartnerInformation/ListofPartners/partner/jpcert>,
 Red Hat<https://www.cve.org/PartnerInformation/ListofPartners/partner/redhat>, 
Spanish National Cybersecurity Institute 
(INCIBE)<https://www.cve.org/PartnerInformation/ListofPartners/partner/INCIBE>, 
and Thales 
Group<https://www.cve.org/PartnerInformation/ListofPartners/partner/THA-PSIRT> 
are Roots under the MITRE Top-Level 
Root<https://www.cve.org/PartnerInformation/ListofPartners/partner/mitre>.

We welcome CERT@VDE in its new role!

Respectfully,
CVE Program Secretariat
cve-prog-secretar...@mitre.org<mailto:cve-prog-secretar...@mitre.org>

[A picture containing text, clipart  Description automatically generated]


Reply via email to