GET A DEMO

The Definitive Guide to Vulnerability Scanner Success

With cyber-attacks and data breaches on the rise, cybersecurity has become the focal point of concern for businesses. Vulnerability scanners are a key component of cyber security strategies, and organizations must understand the fundamentals of vulnerability scanning.  What is vulnerability scanning? Vulnerability scanners identify and report vulnerabilities that are affecting or may affect your systems.… Continue reading The Definitive Guide to Vulnerability Scanner Success

The 3rd party data breach resistance

When engaging with third parties, it’s important that you examine their cyber posture as well as your own. Huge tech companies like General Electric, Expedia, and Instagram have each experienced a 3rd party data breach in the last year due to improper relationships with unreliable third parties. In efforts to prevent a breach, enterprises should… Continue reading The 3rd party data breach resistance

The Worst Types of Data Breaches of 2020 and 2021

With the worldwide transition to remote work over the past year, the scale and types of data breaches incurred by enterprises have been increasing rapidly. It is now more important than ever to protect your business from cyber threats. It’s up to your security team to understand previous cyber attacks and prevent them from happening… Continue reading The Worst Types of Data Breaches of 2020 and 2021

The Top Five Network Vulnerability Scanners for 2021

Network vulnerability scanning has become a fundamental practice in cybersecurity because it is the first step in keeping attackers out. After all, if they can’t get in they can’t attack. Vulnerability scanning tools search through and report on vulnerabilities in your system for you—saving valuable time and resources. Here are the top five for 2021:… Continue reading The Top Five Network Vulnerability Scanners for 2021

Fixing CVE-2021-34527, the Windows Print Spooler RCE Vulnerability

At Vulcan Cyber, we keep ourselves front and center in the conversation on security, in part through Vulcan Remedy Cloud, the world’s largest free and curated database of reliable vulnerability solutions. To keep our finger on the pulse of security, we track in-demand and trending vulnerabilities. In July, CVE-2021-34527, the Windows Print Spooler Remote Code… Continue reading Fixing CVE-2021-34527, the Windows Print Spooler RCE Vulnerability

CVE-2017-5715: The most searched security vulnerability in Q2 2021 and how to fix it

Computer security can seem like a ceaseless—and thankless—task. Vulcan Cyber is here to help in as many ways as possible, including offering Vulcan Remedy Cloud, the largest free and curated online database of tried and tested vulnerability remediation solutions. In this post, we will cover the “most searched” security vulnerability in Remedy Cloud during Q2,… Continue reading CVE-2017-5715: The most searched security vulnerability in Q2 2021 and how to fix it

Vulcan wins Hermes Creative Awards: Behind the Scenes of an Award-Winning Brand

  This just in: The 2021 Hermes Creative Awards have just been announced, and Vulcan Cyber has won platinum for website design! We’re indebted to the tech branding agency Atreo for their great work helping us articulate and express who we are and what we do, and we couldn’t be more excited about this global… Continue reading Vulcan wins Hermes Creative Awards: Behind the Scenes of an Award-Winning Brand

CISO Perspectives on Business Risk and Vulnerability Remediation

When security teams have to scramble between remediations, hoping to stay a step ahead of their hacker adversaries, high-level strategy is not a priority. That’s why Vulcan invited two security leaders to Remediation Summit 2020—Akamai CSO Andy Ellis and Levi’s deputy CISO Steve Zalewski—to share their perspectives on vulnerability remediation as a piece of the… Continue reading CISO Perspectives on Business Risk and Vulnerability Remediation

What is a Microsoft Exchange Server vulnerability, and how do you fix it?

This post provides all the information you need to ensure that your organization does not fall victim to one of the most devastating vulnerabilities to emerge in recent years: The Microsoft Exchange Server remote code execution vulnerability. This has been one of the most popular searches on Remedy Cloud in March and April 2021 due… Continue reading What is a Microsoft Exchange Server vulnerability, and how do you fix it?

Promote Good Risk Management Process by Avoiding These Five Mistakes

Each data breach in the United States now costs $8.64 million, a 5% increase from 2019 to 2020. New vulnerabilities are disclosed on a daily basis, and old vulnerabilities are still being exploited months and years later. Regulators have been applying stiffer fines whenever personal data security is involved, making risk management process mistakes more… Continue reading Promote Good Risk Management Process by Avoiding These Five Mistakes