CVE-2023-21716 in Microsoft products: Learn about the new critical RCE vulnerability (CVSS 9.8) | Read more >>

Securing Docker – the complete guide: Keep assets and data safe in your container environment | Read more >>

CISA’s KEV additions: Stay on top of the recently added CVEs, and how to fix them | Read more >>

How to prevent data exfiltration attacks in GCP? Learn what these are, and how to stay protected | Read more >>

CVE-2023-21716 in Microsoft products: Learn about the new critical RCE vulnerability (CVSS 9.8) | Read more >>

Securing Docker – the complete guide: Keep assets and data safe in your container environment | Read more >>

CISA’s KEV additions: Stay on top of the recently added CVEs, and how to fix them | Read more >>

How to prevent data exfiltration attacks in GCP? Learn what these are, and how to stay protected | Read more >>

TRY VULCAN FREE

The Vulcan Cyber website: updates for a changing cyber risk world

You may have noticed something different recently about the Vulcan Cyber website.  If change is the only constant in business, the security posture of business better hold on tight. Every new product, feature, or pivot means a new set of associated cyber risks associated with new, potentially critical, vulnerabilities. Meanwhile, exciting new technologies that open… Continue reading The Vulcan Cyber website: updates for a changing cyber risk world

The real cost of a data breach (according to IBM)

What’s the real cost of a data breach? Cyber security is a game of cat and mouse. Security practitioners and threat actors work to outrun each other, with the ultimate goal of securing – or accessing – critical data. And because so much work goes into protecting assets, practitioners are often stuck in the trenches,… Continue reading The real cost of a data breach (according to IBM)

Vulcan Cyber announced as Optiv Future Point strategic partner

Vulcan Cyber® is proud to be included as one of only four strategic partners in the recently launched Optiv Future Point program, and the only vendor representing the vulnerability remediation category.  The two organizations will work together in driving effective cyber risk management outcomes,  with Vulcan Cyber delivering Optiv customers the capabilities to reduce MTTR, to better… Continue reading Vulcan Cyber announced as Optiv Future Point strategic partner

5 Lessons learned from the CyberRisk Summit

Last week, we held our semi-annual CyberRisk Summit. We brought together our industry’s leading practitioners to discuss the tools, technologies and best practices that they turn to each day to improve their organizations’ security posture.  But if you missed the sessions, don’t worry! We’ve put together this list of the main takeaways from our latest… Continue reading 5 Lessons learned from the CyberRisk Summit

Launching the CyberRisk Summit – sessions to look out for

In the past, Vulcan Cyber has self-hosted the virtual Remediation Summit every six months. This virtual cyber security conference brought together IT security professionals from around the world to share best practices, tools, and technologies, with the ultimate aim of driving improvements in cyber hygiene across their organizations.  A new kind of cyber security conference… Continue reading Launching the CyberRisk Summit – sessions to look out for

Cyber security conferences – 5 of the best virtual events this summer

Cyber risk doesn’t have a calendar. Threats rise and attack surfaces grow, with no regard for the season. It might be getting sunnier outside, but that only leaves more shadows for attackers to lurk in. Today though, IT professionals can stay up to date with emerging trends while also working around their summer plans. Here… Continue reading Cyber security conferences – 5 of the best virtual events this summer

Risk based security: what is it?

Today, teams struggle to manage and mitigate cyber risk, contending with IT environments that sprawl increasingly across siloed teams, tools, and technologies. In short, risk-based security is getting harder.   Traditional vulnerability management was hard enough. Keeping on-premises servers and hosts secure required the sustained efforts of security teams working to prioritize and fix those vulnerabilities… Continue reading Risk based security: what is it?

10 Cloud Security Scanners to Know About for 2022

The technical landscape is always changing, and 2022 is no exception. More businesses and organizations are fully migrating to cloud-based services. Those who haven’t quite made the full leap forward are probably at least dabbling in cloud tools. While on-premise environments are still in play, the cloud allows teams more flexibility.  However, a cloud-based operation… Continue reading 10 Cloud Security Scanners to Know About for 2022

SANS Cloud Security Survey 2022 – highlights

In 2022, security issues have increased in cloud assets, leading to more data breaches involving cloud environments. But, despite the growing threats and attached cyber risk, organizations are undeterred in migrating to the cloud with greater acceleration than ever before.  But is the greater exposure to cyber risk matched by organizations taking the steps to… Continue reading SANS Cloud Security Survey 2022 – highlights

What Is spaghetti code and why is it a problem?

More than sloppy programming: how “spaghetti code” increases cyber risk When writing source code, one habit programmers should avoid is spaghetti coding. Left unchecked, it could cause multiple problems for your organization’s infrastructure later on. Here we discuss what spaghetti code is and why getting rid of it is a major factor in your cyber… Continue reading What Is spaghetti code and why is it a problem?