You may have noticed something different recently about the Vulcan Cyber website. If change is the only constant in business, the security posture of business better hold on tight. Every new product, feature, or pivot means a new set of associated cyber risks associated with new, potentially critical, vulnerabilities. Meanwhile, exciting new technologies that open… Continue reading The Vulcan Cyber website: updates for a changing cyber risk world
What’s the real cost of a data breach? Cyber security is a game of cat and mouse. Security practitioners and threat actors work to outrun each other, with the ultimate goal of securing – or accessing – critical data. And because so much work goes into protecting assets, practitioners are often stuck in the trenches,… Continue reading The real cost of a data breach (according to IBM)
Vulcan Cyber® is proud to be included as one of only four strategic partners in the recently launched Optiv Future Point program, and the only vendor representing the vulnerability remediation category. The two organizations will work together in driving effective cyber risk management outcomes, with Vulcan Cyber delivering Optiv customers the capabilities to reduce MTTR, to better… Continue reading Vulcan Cyber announced as Optiv Future Point strategic partner
Last week, we held our semi-annual CyberRisk Summit. We brought together our industry’s leading practitioners to discuss the tools, technologies and best practices that they turn to each day to improve their organizations’ security posture. But if you missed the sessions, don’t worry! We’ve put together this list of the main takeaways from our latest… Continue reading 5 Lessons learned from the CyberRisk Summit
In the past, Vulcan Cyber has self-hosted the virtual Remediation Summit every six months. This virtual cyber security conference brought together IT security professionals from around the world to share best practices, tools, and technologies, with the ultimate aim of driving improvements in cyber hygiene across their organizations. A new kind of cyber security conference… Continue reading Launching the CyberRisk Summit – sessions to look out for
Cyber risk doesn’t have a calendar. Threats rise and attack surfaces grow, with no regard for the season. It might be getting sunnier outside, but that only leaves more shadows for attackers to lurk in. Today though, IT professionals can stay up to date with emerging trends while also working around their summer plans. Here… Continue reading Cyber security conferences – 5 of the best virtual events this summer
Today, teams struggle to manage and mitigate cyber risk, contending with IT environments that sprawl increasingly across siloed teams, tools, and technologies. In short, risk-based security is getting harder. Traditional vulnerability management was hard enough. Keeping on-premises servers and hosts secure required the sustained efforts of security teams working to prioritize and fix those vulnerabilities… Continue reading Risk based security: what is it?
The technical landscape is always changing, and 2022 is no exception. More businesses and organizations are fully migrating to cloud-based services. Those who haven’t quite made the full leap forward are probably at least dabbling in cloud tools. While on-premise environments are still in play, the cloud allows teams more flexibility. However, a cloud-based operation… Continue reading 10 Cloud Security Scanners to Know About for 2022
In 2022, security issues have increased in cloud assets, leading to more data breaches involving cloud environments. But, despite the growing threats and attached cyber risk, organizations are undeterred in migrating to the cloud with greater acceleration than ever before. But is the greater exposure to cyber risk matched by organizations taking the steps to… Continue reading SANS Cloud Security Survey 2022 – highlights
More than sloppy programming: how “spaghetti code” increases cyber risk When writing source code, one habit programmers should avoid is spaghetti coding. Left unchecked, it could cause multiple problems for your organization’s infrastructure later on. Here we discuss what spaghetti code is and why getting rid of it is a major factor in your cyber… Continue reading What Is spaghetti code and why is it a problem?